41 found
Order:
Disambiguations
Stephen F. Bush [16]Stephen S. Bush [12]Stephen Bush [11]Stephen F. S. F. Bush [2]
Stephen Francis Bush [1]
See also
  1. Divine and Human Happiness in Nicomachean Ethics.Stephen Bush - 2008 - Philosophical Review 117 (1):49-75.
    presents a puzzle as to whether Aristotle views morally virtuous activity as happiness, as book 1 seems to indicate, or philosophical contemplation as happiness, as book 10 seems to indicate. The most influential attempts to resolve this issue have been either monistic or inclusivist. According to the monists, happiness consists exclusively of contemplation. According to the inclusivists, contemplation is one constituent of happiness, but morally virtuous activity is another. In this essay I will examine influential defenses of monism. Finding these (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  2.  51
    Concepts and Religious Experiences: Wayne Proudfoot on the Cultural Construction of Experiences.Stephen S. Bush - 2012 - Religious Studies 48 (1):101 - 117.
    The constructivist position, that mystical experiences are determined by the experiencer's cultural context, is now more prevalent among scholars of religion than the perennialist position, which maintains that mystical experiences have a common core that is cross-culturally universal. In large part, this is due to the efforts of Wayne Proudfoot in his widely accepted book, Religious Experience.In this article, I identify some significant unresolved issues in Proudfoot's defence of constructivism. My aim is not to defend perennialism, but to specify some (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3. Ieee Vision for Smart Grid Communications: 2030 and Beyond.Sanjay Goel, Stephen Bush, Bakken F. & David - forthcoming - Standard-Download.Org.
    This document provides a vision of the communications-related aspects of the Smart Grid in the year 2030, and lays out the technology roadmap that will lead us to the vision. This document starts with some basic knowledge of the power grid and follows up with fundamental building blocks for the communication infrastructure that will accompany the Smart Grid. Subsequently, network architectures, including overlays, are discussed at length. Also discussed, are important issues such as standards, regulations, security, and disruptive technologies. The (...)
     
    Export citation  
     
    Bookmark  
  4. Visions of Religion: Experience, Meaning, and Power.Stephen S. Bush - 2014 - Oxford University Press USA.
    Winner of the Gustave O. Arlt Award in the HumanitiesThree understandings of the nature of religion--religion as experience, symbolic meaning, and power--have dominated scholarly discussions, in succession, for the past hundred years. Proponents of each of these three approaches have tended to downplay, ignore, or actively criticize the others. But why should the three approaches be at odds? Religion as it is practiced involves experiences, meanings, and power, so students of religion should attend to all three. Furthermore, theorists of religion (...)
     
    Export citation  
     
    Bookmark   1 citation  
  5.  56
    The Ethics of Ecstasy: Georges Bataille and Amy Hollywood on Mysticism, Morality, and Violence.Stephen S. Bush - 2011 - Journal of Religious Ethics 39 (2):299-320.
    Georges Bataille agrees with numerous Christian mystics that there is ethical and religious value in meditating upon, and having ecstatic episodes in response to, imagery of violent death. For Christians, the crucified Christ is the focus of contemplative efforts. Bataille employs photographic imagery of a more-recent victim of torture and execution. In this essay, while engaging with Amy Hollywood's interpretation of Bataille in Sensible Ecstasy, I show that, unlike the Christian mystics who influence him, Bataille strives to divorce himself from (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  18
    Horribly Wrong.Stephen S. Bush - 2013 - Journal of Religious Ethics 41 (4):585-600.
    Moral horror is an extreme emotional response to that which violates things we regard as sacred. In Robert Merrihew Adams's view, horror is a response to badness and not to wrongness, and so one could properly regard some actions as horrible but not wrong. In contrast, I argue that horror, when directed toward actions, is only appropriate for wrong actions. The reason is that horror involves moral disgust, and agents who committed a horrible action would have self-disgust, that is, they (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  15
    Kolmogorov Complexity Estimates for Detection of Viruses in Biologically Inspired Security Systems: A Comparison with Traditional Approaches.Sanjay Goel & Stephen F. Bush - 2003 - Complexity 9 (2):54-73.
  8.  24
    Genetically Induced Communication Network Fault Tolerance.Stephen F. Bush - 2003 - Complexity 9 (2):19-33.
    This paper presents the architecture and initial feasibility results of a proto-type communication network that utilizes genetic programming to evolve services and protocols as part of network operation. The network evolves responses to environmental conditions in a manner that could not be preprogrammed within legacy network nodes a priori. A priori in this case means before network operation has begun. Genetic material is exchanged, loaded, and run dynamically within an active network. The transfer and execution of code in support of (...)
    No categories
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  14
    Book Review: Tolerance Among the Virtues, by John R. Bowlin. [REVIEW]Stephen S. Bush - 2019 - Political Theory 47 (3):439-444.
  10.  15
    A Simple Metric for Ad Hoc Network Adaptation.Stephen F. S. F. Bush - 2005 - Ieee Journal on Selected Areas in Communications Journal 23 (12):2272--2287.
    This paper examines flexibility in ad hoc networks and suggests that, even with cross-layer design as a mechanism to improve adaptation, a fundamental limitation exists in the ability of a single optimization function, defined a priori, to adapt the network to meet all quality-of-service requirements. Thus, code implementing multiple algorithms will have to be positioned within the network. Active networking and programmable networking enable unprecedented autonomy and flexibility for ad hoc communication networks. However, in order to best leverage the results (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  40
    Kevin Schilbrack: Philosophy and the Study of Religions: A Manifesto: Chichester, West Sussex: Wiley Blackwell, 2014.Stephen Bush - 2015 - International Journal for Philosophy of Religion 77 (1):79-83.
    This book review essay summarizes the key arguments of Kevin Schilbrack’s Philosophy and the Study of Religions: A Manifesto and offers two critical responses.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  42
    IEEE Vision for Smart Grid Communications: 2030 and Beyond Roadmap.Stephen Bush, Goel F., Simard Sanjay & Georges - forthcoming - Standard-Download.Org.
    This IEEE Vision for Smart Grid Communications: 2030 and Beyond Roadmap is a high-levelsupplement of the full vision document IEEE Vision for Smart Grid Communications: 2030 andBeyond. Communication is a major enabling technology for the Smart Grid. We believe that the powergrid will tend to utilize advances in communications since the data exchange requirements willscale up for the Smart Grid. Smart Grid communication will help to improve demand forecasting,enable self-healing from power disturbance events, facilitate active participation by consumers in demand-response (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  28
    IEEE Vision for Smart Grid Communications: 2030 and Beyond Reference Model.Stephen Bush, Goel F., Simard Sanjay & Georges - forthcoming - Philosophical Explorations.
    IEEE Vision for Smart Grid Communications: 2030 and Beyond Reference Model, directly overlays events in the power grid with communication performance on the same space-time model, it ensures a perspective that verifies that any of the myriad of communication technologies chosen will provide the required support for the Smart Grid.
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  24
    A Control and Management Network for Wireless ATM Systems.Stephen Bush, Jagannath F., Evans Sunil, B. Joseph, Victor Frost, Gary Minden & K. Sam Shanmugan - 1997 - Acm-Baltzer Wireless Networks 3:267--283.
    This paper describes the design of a control and management network (orderwire) for a mobile wireless Asynchronous Transfer Mode (ATM) network. This mobile wireless ATM network is part of the Rapidly Deployable Radio Network (RDRN). The orderwire system consists of a packet radio network which overlays the mobile wireless ATM network, each network element in this network uses Global Positioning System (GPS) information to control a beamforming antenna subsystem which provides for spatial reuse. This paper also proposes a novel Virtual (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  15.  23
    Nothing Outside the Text: Derrida and Brandom on Language and World.Stephen S. Bush - 2009 - Contemporary Pragmatism 6 (2):45-69.
    The terms deconstruction and différence are central to both Jacques Derrida's work and to poststructuralism generally. These terms attempt to provide an alternative to metaphysical construals of linguistic meaning. I compare Derrida's discussion of linguistic meaning and reference with the contemporary pragmatist, Robert Brandom, arguing that Brandom has important similarities to Derrida. However, whereas Derrida remains committed to metaphysics even as he tries to contest it, Brandom, to his credit, more thoroughly rejects metaphysics.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  16.  22
    Georges Bataille's Mystical Cruelty.Stephen S. Bush - 2012 - Journal of Religious Ethics 40 (3):551-555.
    In this reply to Kent Brintnall's response to my essay on Georges Bataille and the ethics of ecstasy, I explore two primary questions: whether instrumentalization is inherently violent and non-instrumentalization is inherently non-violent, and whether there is a way to intervene in the world that avoids both “apathetic disengagement” and domination. I endorse the view that instrumentalization can be good as well as bad, and I suggest that it is possible to strive to intervene in the world without striving to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17. Toward in Vivo Nanoscale Communication Networks: Utilizing an Active Network Architecture.Stephen F. Bush - 2011 - Frontiers of Computer Science in China 5 (1):1--9.
     
    Export citation  
     
    Bookmark  
  18.  25
    G. Scott Davis: Believing and Acting: The Pragmatic Turn in Comparative Religion and Ethics: Oxford University Press, Oxford, 2012, 234 Pp., $55.00. [REVIEW]Stephen S. Bush - 2012 - International Journal for Philosophy of Religion 72 (3):243-247.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  19.  15
    Brittle System Analysis.Stephen Bush, Hershey F., Vosburgh John & Kirby - forthcoming - Arxiv Preprint Cs/9904016.
    The goal of this paper is to define and analyze systems which exhibit brittle behavior. This behavior is characterized by a sudden and steep decline in performance as the system approaches the limits of tolerance. This can be due to input parameters which exceed a specified input, or environmental conditions which exceed specified operating boundaries. An analogy is made between brittle commmunication systems in particular and materials science.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  18
    Biological Models of Security for Virus Propagation in Computer Networks.Sanjay Goel & Stephen F. S. F. Bush - 2004 - Login, December 29 (6):49--56.
    This aricle discusses the similarity between the propagation of pathogens (viruses and worms) on computer networks and the proliferation of pathogens in cellular organisms (organisms with genetic material contained within a membrane-encased nucleus). It introduces several biological mechanisms which are used in these organisms to protect against such pathogens and presents security models for networked computers inspired by several biological paradigms, including genomics (RNA interference), proteomics (pathway mapping), and physiology (immune system). In addition, the study of epidemiological models for disease (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  21. Network Management of Predictive Mobile Networks.Stephen Bush, Frost F., S. Victor, Joseph Evans & B. - 1999 - Journal of Network and Systems Management 7 (2).
    There is a trend toward the use of predictive systems in communications networks. At the systems and network management level predictive capabilities are focused on anticipating network faults and performance degradation. Simultaneously, mobile communication networks are being developed with predictive location and tracking mechanisms. The interactions and synergies between these systems present a new set of problems. A new predictive network management framework is developed and examined. The interaction between a predictive mobile network and the proposed network management system is (...)
     
    Export citation  
     
    Bookmark  
  22. Mobile ATM Buffer Capacity Analysis.Stephen Bush, Evans F., B. Joseph & Victor Frost - 1996 - Acm-Baltzer Mobile Networks and Nomadic Applications 1 (1):67--73.
    This paper extends a stochastic theory for buffer fill distribution for multiple “on‘ and “off‘ sources to a mobile environment. Queue fill distribution is described by a set of differential equations assuming sources alternate asynchronously between exponentially distributed periods in “on‘ and “off‘ states. This paper includes the probabilities that mobile sources have links to a given queue. The sources represent mobile user nodes, and the queue represents the capacity of a switch. This paper presents a method of analysis which (...)
     
    Export citation  
     
    Bookmark  
  23.  16
    Active Net.Stephen F. Bush - 2007 - In Hossein Bidgoli (ed.), Volume Iii: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications. Wiley. pp. 985--1011.
    Active networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very likely to appeal to a broad spectrum of users from academia and industry. Therefore, this book was written in a way that enables all these (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  14
    The Limits of Motion Prediction Support for Ad Hoc Wireless Network Performance.Stephen F. Bush & Nathan Smith - forthcoming - Arxiv Preprint Cs/0512092:27--30.
    A fundamental understanding of gain provided by motion prediction in wireless ad hoc routing is currently lacking. This paper examines benefits in routing obtainable via prediction. A theoretical best-case non-predictive routing model is quantified in terms of both message overhead and update time for non-predictive routing. This best- case model of existing routing performance is compared with predictive routing. Several specific instances of predictive improvements in routing are examined. The primary contribution of this paper is quantification of predictive gain for (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  10
    5.Stephen F. Bush - 2013 - In Information Theory and Network Science for Power Systems. Wiley-Ieee Press. pp. 128--161.
  26.  13
    The Uses of Paradox.Stephen S. Bush - 2010 - Faith and Philosophy 27 (2):240-243.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  27.  4
    Persistence Length as a Metric for Modeling and Simulation of Nanoscale Communication Networks.Stephen F. Bush & Sanjay Goel - 2013 - Ieee Journal on Selected Areas in Communications 31 (12):815-824.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  8
    Wireless Ad Hoc Nanoscale Networking.Stephen F. Bush - 2009 - Ieee Wireless Communications 16 (5):6--7.
    Wireless ad hoc communication on the nanoscale will require thinking outside of the traditional radio spectrum. New applications will utilize new forms of wireless communication channels. For example, nanoscale communication will enable precise mechanisms for directly interacting with cells in vivo. Information may be sent to and from specific cells within the body, allowing detection and healing of diseases on the cellular scale. From a medical standpoint, the use of current wireless techniques to communicate with implants is unacceptable for many (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  4
    The Uses of Paradox: Religion, Self-Transformation, and the Absurd. [REVIEW]Stephen S. Bush - 2010 - Faith and Philosophy 27 (2):240-243.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  30.  6
    Letters, Notes, & Comments.Kent L. Brintnall & Stephen S. Bush - 2012 - Journal of Religious Ethics 40 (3):545 - 555.
    This Comment argues that Stephen Bush's critique of Georges Bataille's meditative practice fails to recognize how the disruption of the self, and the challenge to goal-oriented activity that comprise the heart of that practice, serve as an ethical limit that protects against sadistic and violent engagement with the world. The ethical disposition fostered by Bataille's practice is a dissolution of the self. In this reply to Kent Brintnall's response to my essay on Georges Bataille and the ethics of ecstasy, I (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  31. A Comparative Study of Four Change Detection Methods for Aerial Photography Applications.Gil Abramovich, Glen Brooksby, Stephen Bush, Manickam F., Ozcanli Swaminathan, Garrett Ozge & D. Benjamin - 2010 - Spie.
    We present four new change detection methods that create an automated change map from a probability map. In this case, the probability map was derived from a 3D model. The primary application of interest is aerial photographic applications, where the appearance, disappearance or change in position of small objects of a selectable class (e.g., cars) must be detected at a high success rate in spite of variations in magnification, lighting and background across the image. The methods rely on an earlier (...)
     
    Export citation  
     
    Bookmark  
  32.  10
    Active Networks and Active Network Management a Proactive Management Framework: Solution Manual.Stephen F. Bush & Amit B. Kulkarni - 2007 - Kluwer Academic/Plenum Publishers.
    Active networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very likely to appeal to a broad spectrum of users from academia and industry. Therefore, this book was written in a way that enables all these (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  33. A Quantitative Approach to Measuring Assurance with Uncertainty in Data Provenance.Stephen Bush, Moitra F., Crapo Abha, Barnett Andrew, Dill Bruce & J. Stephen - manuscript
    A data provenance framework is subject to security threats and risks, which increase the uncertainty, or lack of trust, in provenance information. Information assurance is challenged by incomplete information; one cannot exhaustively characterize all threats or all vulnerabilities. One technique that specifically incorporates a probabilistic notion of uncertainty is subjective logic. Subjective logic allows belief and uncertainty, due to incomplete information, to be specified and operated upon in a coherent manner. A mapping from the standard definition of information assurance to (...)
     
    Export citation  
     
    Bookmark  
  34. Graph Spectra for Communications in Biological and Carbon Nanotube Networks.Stephen F. Bush & Sanjay Goel - forthcoming - Ieee Journal on Selected Areas in Communications:1--10.
    No categories
     
    Export citation  
     
    Bookmark  
  35. Information Theory and Network Science for Power Systems.Stephen F. Bush - 2013 - Wiley-Ieee Press.
    Translate
     
     
    Export citation  
     
    Bookmark  
  36. Nano-Communications: A New Field? An Exploration Into a Carbon Nanotube Communication Network.Stephen F. Bush & Yun Li - 2006 - Technical Information Series.
     
    Export citation  
     
    Bookmark  
  37. Nanoscale Communication Networks.Stephen F. Bush - 2010 - Artech House.
    A highly useful resource for professionals and students alike, this cutting-edge, first-of-its-kind book provides a thorough introduction to nanoscale communication networks. Written in a clear tutorial style, this volume covers a wide range of the most important topics in the area, from molecular communication and carbon nanotube nano-networks, to nanoscale quantum networking and the future direction of nano networks. Moreover, the book features numerous exercise problems at the end of each chapter to ensure a solid understanding of the material.
    No categories
     
    Export citation  
     
    Bookmark  
  38. Reasoning About Information Assurance Policy with Uncertainty Using the Semantic Web.Stephen F. Bush - forthcoming - Annual Symposium on Information Assurance:1--7.
    This is a brief letter outlining speculative ideas for semantic web reasoning about information assurance. Much work has been done on the development of semantic web applications for reasoning about information assurance. A significant portion of this work is focused upon semantic web ontologies and reasoning about security policies and the underlying implementation of those policies. While numerous semantic web-based security policy ontologies and reasoners exist, both academically and commercially, I will briefly focus on ideas related to solutions to the (...)
     
    Export citation  
     
    Bookmark  
  39. Smart Grid: Communication-Enabled Intelligence for the Electric Power Grid.Stephen F. Bush - 2014 - Wiley-Ieee Press.
     
    Export citation  
     
    Bookmark  
  40. The Design and Analysis of Virtual Network Configuration for a Wireless Mobile Atm Network.Stephen F. Bush - 1999 - Dissertation,
    This research concentrates on the design and analysis of an algorithm referred to as Virtual Network Configuration (VNC) which uses predicted future states of a system for faster network configuration and management. VNC is applied to the configuration of a wireless mobile ATM network. VNC is built on techniques from parallel discrete event simulation merged with constraints from real-time systems and applied to mobile ATM configuration and handoff. Configuration in a mobile network is a dynamic and continuous process. Factors such (...)
     
    Export citation  
     
    Bookmark  
  41. William James on Democratic Individuality.Stephen S. Bush - 2017 - Cambridge University Press.
    William James argued for a philosophy of democracy and pluralism that advocates individual and collective responsibility for our social arrangements, our morality, and our religion. In James' view, democracy resides first and foremost not in governmental institutions or in procedures such as voting, but rather in the characteristics of individuals, and in qualities of mind and conduct. It is a philosophy for social change, counselling action and hope despite the manifold challenges facing democratic politics, and these issues still resonate strongly (...)
    No categories
     
    Export citation  
     
    Bookmark