Results for 'associative addressing in computers'

991 found
Order:
  1.  8
    Computer Science Logic: 11th International Workshop, CSL'97, Annual Conference of the EACSL, Aarhus, Denmark, August 23-29, 1997, Selected Papers.M. Nielsen, Wolfgang Thomas & European Association for Computer Science Logic - 1998 - Springer Verlag.
    This book constitutes the strictly refereed post-workshop proceedings of the 11th International Workshop on Computer Science Logic, CSL '97, held as the 1997 Annual Conference of the European Association on Computer Science Logic, EACSL, in Aarhus, Denmark, in August 1997. The volume presents 26 revised full papers selected after two rounds of refereeing from initially 92 submissions; also included are four invited papers. The book addresses all current aspects of computer science logics and its applications and thus presents the state (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  2. Computer Simulations, Machine Learning and the Laplacean Demon: Opacity in the Case of High Energy Physics.Florian J. Boge & Paul Grünke - forthcoming - In Andreas Kaminski, Michael Resch & Petra Gehring (eds.), The Science and Art of Simulation II.
    In this paper, we pursue three general aims: (I) We will define a notion of fundamental opacity and ask whether it can be found in High Energy Physics (HEP), given the involvement of machine learning (ML) and computer simulations (CS) therein. (II) We identify two kinds of non-fundamental, contingent opacity associated with CS and ML in HEP respectively, and ask whether, and if so how, they may be overcome. (III) We address the question of whether any kind of opacity, contingent (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  3.  24
    Computational modelling of protein interactions: Energy minimization for the refinement and scoring of association decoys.Alexander Dibrov, Yvonne Myal & Etienne Leygue - 2009 - Acta Biotheoretica 57 (4):419-428.
    The prediction of protein–protein interactions based on independently obtained structural information for each interacting partner remains an important challenge in computational chemistry. Procedures where hypothetical interaction models (or decoys) are generated, then ranked using a biochemically relevant scoring function have been garnering interest as an avenue for addressing such challenges. The program PatchDock has been shown to produce reasonable decoys for modeling the association between pig alpha-amylase and the VH-domains of camelide antibody raised against it. We designed a biochemically (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4. Ethical Challenges Associated with the Development and Deployment of Brain Computer Interface Technology.Paul McCullagh, Gaye Lightbody, Jaroslaw Zygierewicz & W. George Kernohan - 2013 - Neuroethics 7 (2):109-122.
    Brain Computer Interface (BCI) technology offers potential for human augmentation in areas ranging from communication to home automation, leisure and gaming. This paper addresses ethical challenges associated with the wider scale deployment of BCI as an assistive technology by documenting issues associated with the development of non-invasive BCI technology. Laboratory testing is normally carried out with volunteers but further testing with subjects, who may be in vulnerable groups is often needed to improve system operation. BCI development is technically complex, sometimes (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  5.  18
    Exploring the Computational Explanatory Gap.James Reggia, Di-Wei Huang & Garrett Katz - 2017 - Philosophies 2 (1):5.
    While substantial progress has been made in the field known as artificial consciousness, at the present time there is no generally accepted phenomenally conscious machine, nor even a clear route to how one might be produced should we decide to try. Here, we take the position that, from our computer science perspective, a major reason for this is a computational explanatory gap: our inability to understand/explain the implementation of high-level cognitive algorithms in terms of neurocomputational processing. We explain how (...) the computational explanatory gap can identify computational correlates of consciousness. We suggest that bridging this gap is not only critical to further progress in the area of machine consciousness, but would also inform the search for neurobiological correlates of consciousness and would, with high probability, contribute to demystifying the “hard problem” of understanding the mind–brain relationship. We compile a listing of previously proposed computational correlates of consciousness and, based on the results of recent computational modeling, suggest that the gating mechanisms associated with top-down cognitive control of working memory should be added to this list. We conclude that developing neurocognitive architectures that contribute to bridging the computational explanatory gap provides a credible and achievable roadmap to understanding the ultimate prospects for a conscious machine, and to a better understanding of the mind–brain problem in general. (shrink)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  7
    ALPUK91: Proceedings of the 3rd UK Annual Conference on Logic Programming, Edinburgh, 10–12 April 1991.Tim Duncan, C. S. Mellish, Geraint A. Wiggins & British Computer Society - 1992 - Springer.
    Since its conception nearly 20 years ago, Logic Programming - the idea of using logic as a programming language - has been developed to the point where it now plays an important role in areas such as database theory, artificial intelligence and software engineering. However, there are still many challenging research issues to be addressed and the UK branch of the Association for Logic Programming was set up to provide a forum where the flourishing research community could discuss important issues (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7. Email and ethics : style and ethical relations in computer-mediated communication.Emma Rooksby - 2007 - In Michael Beaney (ed.), The Analytic Turn: Analysis in Early Analytic Philosophy and Phenomenology. Routledge.
    E-mail and Ethics explores the ways in which interpersonal relations are affected by being conducted via computer-mediated communication. The advent of this channel of communication has prompted a renewed investigation into the nature and value of forms of human association. Rooksby addresses these concerns in her rigorous investigation of the benefits, limitations and implications of computer-mediated communication. With its depth of research and clarity of style, this book will be of essential interest to philosophers, scholars of communication, cultural and media (...)
     
    Export citation  
     
    Bookmark   1 citation  
  8. Email and Ethics: Style and Ethical Relations in Computer-Mediated Communications.Emma Rooksby - 2002 - Routledge.
    _E-mail and Ethics_ explores the ways in which interpersonal relations are affected by being conducted via computer-mediated communication. The advent of this channel of communication has prompted a renewed investigation into the nature and value of forms of human association. Rooksby addresses these concerns in her rigorous investigation of the benefits, limitations and implications of computer-mediated communication. With its depth of research and clarity of style, this book will be of essential interest to philosophers, scholars of communication, cultural and media (...)
    No categories
     
    Export citation  
     
    Bookmark   1 citation  
  9.  6
    Email and Ethics: Style and Ethical Relations in Computer-Mediated Communications.Emma Rooksby - 2002 - Routledge.
    _E-mail and Ethics_ explores the ways in which interpersonal relations are affected by being conducted via computer-mediated communication. The advent of this channel of communication has prompted a renewed investigation into the nature and value of forms of human association. Rooksby addresses these concerns in her rigorous investigation of the benefits, limitations and implications of computer-mediated communication. With its depth of research and clarity of style, this book will be of essential interest to philosophers, scholars of communication, cultural and media (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  6
    Computing and Philosophy in Asia.Soraj Hongladarom (ed.) - 2007 - Cambridge Scholars Press.
    This volume is a collection of selected papers presented at the Second Asia-Pacific Computing and Philsosophy Conference, which was held in Bangkok, Thailand in January 2005. The conference was organized by the Center for Ethics of Science and Technology, Chulalongkorn University on behalf of the International Association of Computing and Philosophy (www.ia-cap.org). Computing have had a long relationship with philosophy, starting from the problem of how symbols being manipulated in computing bear a relation to the outside world, to those of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  49
    Challenges in developing computational models of emotion and consciousness.Eva Hudlicka - 2009 - International Journal of Machine Consciousness 1 (1):131-153.
    There is a long-standing debate regarding the nature of the relationship between emotions and consciousness. Majority of existing computational models of emotions largely avoid the issue, and generally do not explicitly address distinctions between the conscious and the unconscious components of emotions. This paper highlights the importance of developing an adequately differentiated vocabulary describing the mental states of interest, and their features and components, for the development of computational models of the relationships between emotions and consciousness. We discuss current psychological (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  12. European Computing and Philosophy.Gordana Dodig-Crnkovic - 2009 - The Reasoner 3 (9):18-19.
    European Computing and Philosophy conference, 2–4 July Barcelona The Seventh ECAP (European Computing and Philosophy) conference was organized by Jordi Vallverdu at Autonomous University of Barcelona. The conference started with the IACAP (The International Association for CAP) presidential address by Luciano Floridi, focusing on mechanisms of knowledge production in informational networks. The first keynote delivered by Klaus Mainzer made a frame for the rest of the conference, by elucidating the fundamental role of complexity of informational structures that can be analyzed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  34
    Intuition, Computation, and Information.Ken Herold - 2014 - Minds and Machines 24 (1):85-88.
    Bynum (Putting information first: Luciano Floridi and the philosophy of information. NY: Wiley-Blackwell, 2010) identifies Floridi’s focus in the philosophy of information (PI) on entities both as data structures and as information objects. One suggestion for examining the association between the former and the latter stems from Floridi’s Herbert A. Simon Lecture in Computing and Philosophy given at Carnegie Mellon University in 2001, open problems in the PI: the transduction or transception, and how we gain knowledge about the world as (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  14. Time phases, pointers, rules and embedding.John A. Barnden - 1993 - Behavioral and Brain Sciences 16 (3):451-452.
    This paper is a commentary on the target article by Lokendra Shastri & Venkat Ajjanagadde [S&A]: “From simple associations to systematic reasoning: A connectionist representation of rules, variables and dynamic bindings using temporal synchrony” in same issue of the journal, pp.417–451. -/- It puts S&A's temporal-synchrony binding method in a broader context, comments on notions of pointing and other ways of associating information - in both computers and connectionist systems - and mentions types of reasoning that are a challenge (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  15.  69
    Perspectives on computing ethics: a multi-stakeholder analysis.Damian Gordon, Ioannis Stavrakakis, J. Paul Gibson, Brendan Tierney, Anna Becevel, Andrea Curley, Michael Collins, William O’Mahony & Dympna O’Sullivan - 2022 - Journal of Information, Communication and Ethics in Society 20 (1):72-90.
    Purpose Computing ethics represents a long established, yet rapidly evolving, discipline that grows in complexity and scope on a near-daily basis. Therefore, to help understand some of that scope it is essential to incorporate a range of perspectives, from a range of stakeholders, on current and emerging ethical challenges associated with computer technology. This study aims to achieve this by using, a three-pronged, stakeholder analysis of Computer Science academics, ICT industry professionals, and citizen groups was undertaken to explore what they (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  27
    Computer ethics for the computer professional from an Islamic point of view.Mansoor Al-A'ali - 2008 - Journal of Information, Communication and Ethics in Society 6 (1):28-45.
    PurposeThe purpose of this paper is to study the ethical behaviour of Muslim IT professionals in an attempt to stop many unethical practices such as software piracy, software intellectual property violations and general software development.Design/methodology/approachThis study examines the computer ethical principles presented in the Association for Computing Machinery code of conduct from an Islamic point of view through studying some relevant verses of The Holy Quran and Hadiths of Prophet Mohammed. An evaluation of the benefits of this newly proposed Islamic (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  17.  22
    A Computational Model of Early Argument Structure Acquisition.Afra Alishahi & Suzanne Stevenson - 2008 - Cognitive Science 32 (5):789-834.
    How children go about learning the general regularities that govern language, as well as keeping track of the exceptions to them, remains one of the challenging open questions in the cognitive science of language. Computational modeling is an important methodology in research aimed at addressing this issue. We must determine appropriate learning mechanisms that can grasp generalizations from examples of specific usages, and that exhibit patterns of behavior over the course of learning similar to those in children. Early learning (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  18.  19
    Krishna Sudarsana—A Z-Space Interest Measure for Mining Similarity Profiled Temporal Association Patterns.Radhakrishna Vangipuram, P. V. Kumar, Vinjamuri Janaki, Shadi A. Aljawarneh, Juan A. Lara & Khalaf Khatatneh - 2020 - Foundations of Science 25 (4):1027-1048.
    Similarity profiled association mining from time stamped transaction databases is an important topic of research relatively less addressed in the field of temporal data mining. Mining temporal patterns from these time series databases requires choosing and applying similarity measure for similarity computations and subsequently pruning temporal patterns. This research proposes a novel z-space based interest measure named as Krishna Sudarsana for time-stamped transaction databases by extending interest measure Srihass proposed in previous research. Krishna Sudarsana is designed by using the product (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  10
    The case for a broader approach to AI assurance: addressing “hidden” harms in the development of artificial intelligence.Christopher Thomas, Huw Roberts, Jakob Mökander, Andreas Tsamados, Mariarosaria Taddeo & Luciano Floridi - forthcoming - AI and Society:1-16.
    Artificial intelligence (AI) assurance is an umbrella term describing many approaches—such as impact assessment, audit, and certification procedures—used to provide evidence that an AI system is legal, ethical, and technically robust. AI assurance approaches largely focus on two overlapping categories of harms: deployment harms that emerge at, or after, the point of use, and individual harms that directly impact a person as an individual. Current approaches generally overlook upstream collective and societal harms associated with the development of systems, such as (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20. Proceedings of the 26th Annual Meeting of the Association for Computational Linguistics (SUNY Buffalo).Janyce M. Wiebe & William J. Rapaport (eds.) - 1988 - Assoc for computational linguistics.
    Narrative passages told from a character's perspective convey the character's thoughts and perceptions. We present a discourse process that recognizes characters' thoughts and perceptions in third-person narrative. An effect of perspective on reference In narrative is addressed: references in passages told from the perspective of a character reflect the character's beliefs. An algorithm that uses the results of our discourse process to understand references with respect to an appropriate set of beliefs is presented.
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  12
    Preface: Virtual Entities in Science.Robert Harlander, Jean-Philippe Martinez, Friedrich Steinle & Adrian Wüthrich - 2024 - Perspectives on Science 32 (3):263-268.
    In lieu of an abstract, here is a brief excerpt of the content:Preface: Virtual Entities in ScienceRobert Harlander, Jean-Philippe Martinez, Friedrich Steinle, and Adrian WüthrichIt is not only since the sudden increase of online communication due to the COVID-19 situation that the concept of the “virtual” has made its way into everyday language. In this context, it mostly denotes a digital substitute for a real object or process. Virtual reality is perhaps the best-known term in this respect. With these digital (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  22.  62
    Speech Acts in a Dialogue Game Formalisation of Critical Discussion.Jacky Visser - 2017 - Argumentation 31 (2):245-266.
    In this paper a dialogue game for critical discussion is developed. The dialogue game is a formalisation of the ideal discussion model that is central to the pragma-dialectical theory of argumentation. The formalisation is intended as a preparatory step to facilitate the development of computational tools to support the pragma-dialectical study of argumentation. An important dimension of the pragma-dialectical discussion model is the role played by speech acts. The central issue addressed in this paper is how the speech act perspective (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  23. Association Address: Justice in the International Order.Charles Malik - 1962 - Proceedings and Addresses of the American Philosophical Association 36:1.
  24.  23
    RECkoning with representational apriorism in evolutionary cognitive archaeology.Duilio Garofoli - 2018 - Phenomenology and the Cognitive Sciences 17 (5):973-995.
    In evolutionary cognitive archaeology, the school of thought associated with the traditional framework has been deeply influenced by cognitivist intuitions, which have led to the formulation of mentalistic and disembodied cognitive explanations to address the emergence of artifacts within the archaeological record of ancient hominins. Recently, some approaches in this domain have further enforced this view, by arguing that artifacts are passive means to broadcast/perpetuate meanings that are thoroughly internal to the mind. These meanings are conveyed either in the form (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  25. Models, Parameterization, and Software: Epistemic Opacity in Computational Chemistry.Frédéric Wieber & Alexandre Hocquet - 2020 - Perspectives on Science 28 (5):610-629.
    . Computational chemistry grew in a new era of “desktop modeling,” which coincided with a growing demand for modeling software, especially from the pharmaceutical industry. Parameterization of models in computational chemistry is an arduous enterprise, and we argue that this activity leads, in this specific context, to tensions among scientists regarding the epistemic opacity transparency of parameterized methods and the software implementing them. We relate one flame war from the Computational Chemistry mailing List in order to assess in detail the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  26. Is the brain a digital computer?John R. Searle - 1990 - Proceedings and Addresses of the American Philosophical Association 64 (3):21-37.
    There are different ways to present a Presidential Address to the APA; the one I have chosen is simply to report on work that I am doing right now, on work in progress. I am going to present some of my further explorations into the computational model of the mind.\**.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   112 citations  
  27.  10
    Stable Anatomy Detection in Multimodal Imaging Through Sparse Group Regularization: A Comparative Study of Iron Accumulation in the Aging Brain.Matthew Pietrosanu, Li Zhang, Peter Seres, Ahmed Elkady, Alan H. Wilman, Linglong Kong & Dana Cobzas - 2021 - Frontiers in Human Neuroscience 15.
    Multimodal neuroimaging provides a rich source of data for identifying brain regions associated with disease progression and aging. However, present studies still typically analyze modalities separately or aggregate voxel-wise measurements and analyses to the structural level, thus reducing statistical power. As a central example, previous works have used two quantitative MRI parameters—R2* and quantitative susceptibility —to study changes in iron associated with aging in healthy and multiple sclerosis subjects, but failed to simultaneously account for both. In this article, we propose (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  7
    Assessing the Factors Associated With the Detection of Juvenile Hacking Behaviors.Jin Ree Lee & Thomas J. Holt - 2020 - Frontiers in Psychology 11.
    Research on delinquency reduction often highlights the importance of identifying and sanctioning antisocial and illegal activities so as to reduce the likelihood of future offending. The rise of digital technology complicates the process of detecting cybercrimes and technology enabled offenses, as individuals can use devices from anywhere to engage in various harmful activities that may appear benign to an observer. Despite the growth of cybercrime research, limited studies have examined the extent to which technology enabled offenses are detected, or the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29. From simple associations to systematic reasoning: A connectionist representation of rules, variables, and dynamic binding using temporal synchrony.Lokendra Shastri & Venkat Ajjanagadde - 1993 - Behavioral and Brain Sciences 16 (3):417-51.
    Human agents draw a variety of inferences effortlessly, spontaneously, and with remarkable efficiency – as though these inferences were a reflexive response of their cognitive apparatus. Furthermore, these inferences are drawn with reference to a large body of background knowledge. This remarkable human ability seems paradoxical given the complexity of reasoning reported by researchers in artificial intelligence. It also poses a challenge for cognitive science and computational neuroscience: How can a system of simple and slow neuronlike elements represent a large (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   122 citations  
  30.  36
    Perceiving temporal regularity in music.Edward W. Large & Caroline Palmer - 2002 - Cognitive Science 26 (1):1-37.
    We address how listeners perceive temporal regularity in music performances, which are rich in temporal irregularities. A computational model is described in which a small system of internal self‐sustained oscillations, operating at different periods with specific phase and period relations, entrains to the rhythms of music performances. Based on temporal expectancies embodied by the oscillations, the model predicts the categorization of temporally changing event intervals into discrete metrical categories, as well as the perceptual salience of deviations from these categories. The (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   22 citations  
  31.  3
    Developments in Clinical and Experimental Neuropsychology.John R. Crawford & Denis M. Parker (eds.) - 1989 - Springer.
    The chapters published in this volume developed from presentations, and their associated discussions at a conference organised by the Scottish Branch of the British Psychological Society, held at Rothesay, Isle of Bute, Scotland in September 1987. The goal of the conference was to bring together workers across a wide area of neuropsychological research to discuss recent technological advances, developments in assessment and rehabilitation, and to address theoretical issues of current interest. Thus, the chapters in this book include contributions on the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  41
    Removing inconsistencies in assumption-based theories through knowledge-gathering actions.Jérôme Lang & Pierre Marquis - 2001 - Studia Logica 67 (2):179-214.
    In this paper, the problem of purifying an assumption-based theory KB, i.e., identifying the right extension of KB using knowledge-gathering actions (tests), is addressed. Assumptions are just normal defaults without prerequisite. Each assumption represents all the information conveyed by an agent, and every agent is associated with a (possibly empty) set of tests. Through the execution of tests, the epistemic status of assumptions can change from "plausible" to "certainly true", "certainly false" or "irrelevant", and the KB must be revised so (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  33. Eye-contact and complex dynamic systems: an hypothesis on autism's direct cause and a clinical study addressing prevention.Maxson J. McDowell - manuscript
    (This version was submitted to Behavioral and Brain Science. A revised version was published by Biological Theory) Estimates of autism’s incidence increased 5-10 fold in ten years, an increase which cannot be genetic. Though many mutations are associated with autism, no mutation seems directly to cause autism. We need to find the direct cause. Complexity science provides a new paradigm - confirmed in biology by extensive hard data. Both the body and the personality are complex dynamic systems which spontaneously self-organize (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  34. Explanation in Computational Neuroscience: Causal and Non-causal.M. Chirimuuta - 2018 - British Journal for the Philosophy of Science 69 (3):849-880.
    This article examines three candidate cases of non-causal explanation in computational neuroscience. I argue that there are instances of efficient coding explanation that are strongly analogous to examples of non-causal explanation in physics and biology, as presented by Batterman, Woodward, and Lange. By integrating Lange’s and Woodward’s accounts, I offer a new way to elucidate the distinction between causal and non-causal explanation, and to address concerns about the explanatory sufficiency of non-mechanistic models in neuroscience. I also use this framework to (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   34 citations  
  35. ‘Theory of mind’ in animals: ways to make progress.Elske van der Vaart & Charlotte K. Hemelrijk - 2014 - Synthese 191 (3).
    Whether any non-human animal can attribute mental states to others remains the subject of extensive debate. This despite the fact that several species have behaved as if they have a ‘theory of mind’ in various behavioral tasks. In this paper, we review the reasons of skeptics for their doubts: That existing experimental setups cannot distinguish between ‘mind readers’ and ‘behavior readers’, that results that seem to indicate ‘theory of mind’ may come from studies that are insufficiently controlled, and that our (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  36.  52
    Creativity in Computer Science.Daniel Saunders & Paul Thagard - unknown
    Computer science only became established as a field in the 1950s, growing out of theoretical and practical research begun in the previous two decades. The field has exhibited immense creativity, ranging from innovative hardware such as the early mainframes to software breakthroughs such as programming languages and the Internet. Martin Gardner worried that "it would be a sad day if human beings, adjusting to the Computer Revolution, became so intellectually lazy that they lost their power of creative thinking" (Gardner, 1978, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  77
    'Theory of mind' in animals: ways to make progress.Elske Vaart & Charlotte K. Hemelrijk - 2012 - Synthese (3):1-20.
    Whether any non-human animal can attribute mental states to others remains the subject of extensive debate. This despite the fact that several species have behaved as if they have a ‘theory of mind’ in various behavioral tasks. In this paper, we review the reasons of skeptics for their doubts: That existing experimental setups cannot distinguish between ‘mind readers’ and ‘behavior readers’, that results that seem to indicate ‘theory of mind’ may come from studies that are insufficiently controlled, and that our (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  38.  68
    Ethical dilemmas in the use of information technology: An aristotelian perspective.Michael D. Myers & Leigh Miller - 1996 - Ethics and Behavior 6 (2):153 – 160.
    As computer-based information systems start to have a great impact on people, organizations, and society as a whole, there is much debate about information technology in relation to social control and privacy, security and reliability, and ethics and professional responsibilities. However, more often than not, these debates reveal some fundamental disagreements, sometimes about first principles. In this article the authors suggest that a fruitful and interesting way to conceptualize some of these moral and ethical issues associated with the use of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39.  44
    Classification system for serial criminal patterns.Kamal Dahbur & Thomas Muscarello - 2003 - Artificial Intelligence and Law 11 (4):251-269.
    The data mining field in computer science specializes in extracting implicit information that is distributed across the stored data records and/or exists as associations among groups of records. Criminal databases contain information on the crimes themselves, the offenders, the victims as well as the vehicles that were involved in the crime. Among these records lie groups of crimes that can be attributed to serial criminals who are responsible for multiple criminal offenses and usually exhibit patterns in their operations, by specializing (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  18
    A data-driven machine learning approach for brain-computer interfaces targeting lower limb neuroprosthetics.Arnau Dillen, Elke Lathouwers, Aleksandar Miladinović, Uros Marusic, Fakhredinne Ghaffari, Olivier Romain, Romain Meeusen & Kevin De Pauw - 2022 - Frontiers in Human Neuroscience 16.
    Prosthetic devices that replace a lost limb have become increasingly performant in recent years. Recent advances in both software and hardware allow for the decoding of electroencephalogram signals to improve the control of active prostheses with brain-computer interfaces. Most BCI research is focused on the upper body. Although BCI research for the lower extremities has increased in recent years, there are still gaps in our knowledge of the neural patterns associated with lower limb movement. Therefore, the main objective of this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  14
    A data-driven machine learning approach for brain-computer interfaces targeting lower limb neuroprosthetics.Arnau Dillen, Elke Lathouwers, Aleksandar Miladinović, Uros Marusic, Fakhreddine Ghaffari, Olivier Romain, Romain Meeusen & Kevin De Pauw - 2022 - Frontiers in Human Neuroscience 16.
    Prosthetic devices that replace a lost limb have become increasingly performant in recent years. Recent advances in both software and hardware allow for the decoding of electroencephalogram signals to improve the control of active prostheses with brain-computer interfaces. Most BCI research is focused on the upper body. Although BCI research for the lower extremities has increased in recent years, there are still gaps in our knowledge of the neural patterns associated with lower limb movement. Therefore, the main objective of this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  47
    Truth as social practice in a digital era: iteration as persuasion.Clare L. E. Foster - forthcoming - AI and Society:1-15.
    This article reflects on the problem of false belief produced by the integrated psychological and algorithmic landscape humans now inhabit. Following the work of scholars such as Lee McIntyre (Post-Truth, MIT Press, 2018) or Cailin O’Connor and James Weatherall (The Misinformation Age: How False Beliefs Spread, Yale University Press, 2019) it combines recent discussions of fake news, post-truth, and science denialism across the disciplines of political science, computer science, sociology, psychology, and the history and philosophy of science that variously address (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  53
    Ethical Aspects of BCI Technology: What Is the State of the Art?Allen Coin, Megan Mulder & Veljko Dubljević - 2020 - Philosophies 5 (4):31.
    Brain–Computer Interface (BCI) technology is a promising research area in many domains. Brain activity can be interpreted through both invasive and non-invasive monitoring devices, allowing for novel, therapeutic solutions for individuals with disabilities and for other non-medical applications. However, a number of ethical issues have been identified from the use of BCI technology. In this paper, we review the academic discussion of the ethical implications of BCI technology in the last five years. We conclude that some emerging applications of BCI (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  44.  69
    Artificial intelligence in support of the circular economy: ethical considerations and a path forward.Huw Roberts, Joyce Zhang, Ben Bariach, Josh Cowls, Ben Gilburt, Prathm Juneja, Andreas Tsamados, Marta Ziosi, Mariarosaria Taddeo & Luciano Floridi - forthcoming - AI and Society:1-14.
    The world’s current model for economic development is unsustainable. It encourages high levels of resource extraction, consumption, and waste that undermine positive environmental outcomes. Transitioning to a circular economy (CE) model of development has been proposed as a sustainable alternative. Artificial intelligence (AI) is a crucial enabler for CE. It can aid in designing robust and sustainable products, facilitate new circular business models, and support the broader infrastructures needed to scale circularity. However, to date, considerations of the ethical implications of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  20
    A Similarity-Based Process for Human Judgment in the Parietal Cortex.Linnea Karlsson Wirebring, Sara Stillesjö, Johan Eriksson, Peter Juslin & Lars Nyberg - 2018 - Frontiers in Human Neuroscience 12:408056.
    One important distinction in psychology is between inferences based on associative memory and inferences based on analysis and rules. Much previous empirical work conceive of associative and analytical processes as two exclusive ways of addressing a judgment task, where only one process is selected and engaged at a time, in an either-or fashion. However, related work indicate that the processes are better understood as being in interplay and simultaneously engaged. Based on computational modeling and brain imaging of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  46.  10
    “Motherese” Prosody in Fetal-Directed Speech: An Exploratory Study Using Automatic Social Signal Processing.Erika Parlato-Oliveira, Catherine Saint-Georges, David Cohen, Hugues Pellerin, Isabella Marques Pereira, Catherine Fouillet, Mohamed Chetouani, Marc Dommergues & Sylvie Viaux-Savelon - 2021 - Frontiers in Psychology 12.
    Introduction: Motherese, or emotional infant directed speech, is the specific form of speech used by parents to address their infants. The prosody of IDS has affective properties, expresses caregiver involvement, is a marker of caregiver-infant interaction quality. IDS prosodic characteristics can be detected with automatic analysis. We aimed to explore whether pregnant women “speak” to their unborn baby, whether they use motherese while speaking and whether anxio-depressive or obstetrical status impacts speaking to the fetus.Participants and Methods: We conducted an observational (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  22
    How to Make the Most out of Very Little.Charles Yang - 2020 - Topics in Cognitive Science 12 (1):136-152.
    Yang returns to the problem of referential ambiguity, addressed in the opening paper by Gleitman and Trueswell. Using a computational approach, he argues that “big data” approaches to resolving referential ambiguity are destined to fail, because of the inevitable computational explosion needed to keep track of contextual associations present when a word is uttered. Yang tests several computational models, two of which depend on one‐trial learning, as described in Gleitman and Trueswell’s paper. He concludes that such models outperform cross‐situational learning (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  48.  14
    Big Data in Computational Social Science and Humanities.Shu-Heng Chen (ed.) - 2018 - Springer Verlag.
    This edited volume focuses on big data implications for computational social science and humanities from management to usage. The first part of the book covers geographic data, text corpus data, and social media data, and exemplifies their concrete applications in a wide range of fields including anthropology, economics, finance, geography, history, linguistics, political science, psychology, public health, and mass communications. The second part of the book provides a panoramic view of the development of big data in the fields of computational (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  33
    Spreading Activation in an Attractor Network With Latching Dynamics: Automatic Semantic Priming Revisited.Itamar Lerner, Shlomo Bentin & Oren Shriki - 2012 - Cognitive Science 36 (8):1339-1382.
    Localist models of spreading activation (SA) and models assuming distributed representations offer very different takes on semantic priming, a widely investigated paradigm in word recognition and semantic memory research. In this study, we implemented SA in an attractor neural network model with distributed representations and created a unified framework for the two approaches. Our models assume a synaptic depression mechanism leading to autonomous transitions between encoded memory patterns (latching dynamics), which account for the major characteristics of automatic semantic priming in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  50.  33
    Cryptography, data retention, and the panopticon society (abstract).Jean-François Blanchette & Deborah G. Johnson - 1998 - Acm Sigcas Computers and Society 28 (2):1-2.
    As we move our social institutions from paper and ink based operations to the electronic medium, we invisibly create a type of surveillance society, a panopticon society. It is not the traditional surveillance society in which government officials follow citizens around because they are concerned about threats to the political order. Instead it is piecemeal surveillance by public and private organizations. Piecemeal though it is, It creates the potential for the old kind of surveillance on an even grander scale. The (...)
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 991