Results for ' computer use'

973 found
Order:
  1.  41
    Patient computer use to prompt doctor adherence to diabetes management guidelines.Nairmeen A. Haller, Karen M. Gil, William G. Gardner & Frederick C. Whittier - 2009 - Journal of Evaluation in Clinical Practice 15 (6):1118-1124.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  37
    A New Approach to Computing Using Informons and Holons: Towards a Theory of Computing Science.F. David de la Peña, Juan A. Lara, David Lizcano, María Aurora Martínez & Juan Pazos - 2020 - Foundations of Science 25 (4):1173-1201.
    The state of computing science and, particularly, software engineering and knowledge engineering is generally considered immature. The best starting point for achieving a mature engineering discipline is a solid scientific theory, and the primary reason behind the immaturity in these fields is precisely that computing science still has no such agreed upon underlying theory. As theories in other fields of science do, this paper formally establishes the fundamental elements and postulates making up a first attempt at a theory in this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  43
    Ethical awareness of computer use among undergraduate students.Maslin Masrom, Zuraini Ismail & Ramlah Hussein - 2009 - Acm Sigcas Computers and Society 39 (1):27-40.
    This study investigates the ethical awareness of computer use among undergraduate computer science students at two public Malaysian universities. One hundred and fifty-nine students were asked to evaluate the code of ethics pertaining to computer ethics. A comparison of undergraduate computer science students between two public universities was done to determine the level of ethical awareness of computer use. Independent Samples t-tests for differences were performed across four distinct groups: university, gender, age, and duration of (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  4.  27
    Evolutionary Computation Using Interaction among Genetic Evolution, Individual Learning and Social Learning.Takashi Hashimoto & Katsuhide Warashina - 2008 - In Tu-Bao Ho & Zhi-Hua Zhou (eds.), PRICAI 2008: Trends in Artificial Intelligence. Springer. pp. 152--163.
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  52
    Computational Uses of Philosophical Dialogue Theories.David Moore & Dave Hobbes - 1996 - Informal Logic 18 (2).
    The research discussed in this paper concerns an investigation of logical dialogue games as a vehicle for enhanced human-computer communication. The need for a dialogue capability in computer systems is argued, and a prima facie case made for dialogue games, in particular Mackenzie's "DC", as a suitable dialogue model. Empirical work concerning DC is outlined, and strategies for adoption by the computer are presented. A user interface, software architecture and conceptualised example are discussed. The hope is that (...)
    Direct download (13 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  6. Organized representations forming a computationally useful processing structure.Nicholas Shea - 2023 - Synthese 202 (6):1-20.
    Peter Godfrey-Smith recently introduced the idea of representational ‘organization’. When a collection of representations form an organized family, similar representational vehicles carry similar contents. For example, where neural firing rate represents numerosity (an analogue magnitude representation), similar firing rates represent similar numbers of items. Organization has been elided with structural representation, but the two are in fact distinct. An under-appreciated merit of representational organization is the way it facilitates computational processing. Representations from different organized families can interact, for example to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  7.  9
    Adolescents educational level and computer use: An exploratory study of the relationship between adolescents current educational level and the use of computer applications and computer attitudes.Klaas Gutschoven - 2004 - Communications 29 (2):135-158.
    Direct download  
     
    Export citation  
     
    Bookmark  
  8.  10
    Computer preparedness: A study of computer use self-efficacy among DECA students in Kentucky.Carol A. Decker - 2002 - In Serge P. Shohov (ed.), Advances in Psychology Research. Nova Science Publishers. pp. 16--79.
  9.  34
    Computer Teachers’ Attitudes toward Ethical Use of Computers in Elementary Schools.Niyazi Özer, Celal Teyyar Ugurlu & Kadir Beycioglu - 2011 - International Journal of Cyber Ethics in Education 1 (2):15-24.
    This descriptive study explores the elementary school computer teachers’ attitudes and awareness regarding ethical computer use in classrooms and the differences in teachers’ attitudes and awareness in terms of demographic variables including gender, teaching experiences, pre-service/in-service education about ethical computer use. In order to measure computer teachers’ attitudes, awareness, and teaching practices regarding computer ethics, an adopted version of Cyberethics Questionnaire (CEQ), originally developed by Yamano (2004), was used in this study. The CEQ was administered (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  24
    Intelligent Computation Offloading for IoT Applications in Scalable Edge Computing Using Artificial Bee Colony Optimization.Mohammad Babar, Muhammad Sohail Khan, Ahmad Din, Farman Ali, Usman Habib & Kyung Sup Kwak - 2021 - Complexity 2021:1-12.
    Most of the IoT-based smart systems require low latency and crisp response time for their applications. Achieving the demand of this high Quality of Service becomes quite challenging when computationally intensive tasks are offloaded to the cloud for execution. Edge computing therein plays an important role by introducing low network latency, quick response, and high bandwidth. However, offloading computations at a large scale overwhelms the edge server with many requests and the scalability issue originates. To address the above issues, an (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  98
    Rational Use of Cognitive Resources: Levels of Analysis Between the Computational and the Algorithmic.Thomas L. Griffiths, Falk Lieder & Noah D. Goodman - 2015 - Topics in Cognitive Science 7 (2):217-229.
    Marr's levels of analysis—computational, algorithmic, and implementation—have served cognitive science well over the last 30 years. But the recent increase in the popularity of the computational level raises a new challenge: How do we begin to relate models at different levels of analysis? We propose that it is possible to define levels of analysis that lie between the computational and the algorithmic, providing a way to build a bridge between computational- and algorithmic-level models. The key idea is to push the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   64 citations  
  12.  59
    Virtual Machines, Virtual Infrastructures: The New Historiography of Information TechnologyComputer: A History of the Information MachineMartin Campbell-Kelly William AsprayInformation Technology as Business History: Issues in the History and Management of ComputersJames W. CortadaTransforming Computer Technology: Information Processing for the Pentagon, 1962-1986Arthur L. Norberg Judy E. O'NeillWhere Wizards Stay up Late: The Origins of the InternetKatie Hafner Matthew LyonTrapped in the Net: The Unanticipated Consequences of ComputerizationGene I. RochlinThe Trouble with Computers: Usefulness, Usability, and ProductivityThomas K. Landauer. [REVIEW]Paul N. Edwards - 1998 - Isis 89 (1):93-99.
  13.  10
    Just a Machine? Dehumanizing Strategies in Personal Computer Use.Deborah Lupton & Greg Noble - 1997 - Body and Society 3 (2):83-101.
  14.  44
    Using Computer-Assisted Instruction and Developmental Theory to Improve Argumentative Writing.Ronald R. Irwin - 1995 - Informal Logic 17 (2).
    A study is described in which the effectiveness of a computer program (Hermes) on improving argumentative writing is tested. One group of students was randomly assigned to a control group and the other was assigned to the experimental group where they are asked to use the Hermes program. All students were asked to write essays on controversial topics to an opposed audience. Their essays were content-analysed for dialectical traits. Based on this analysis, it was concluded that the experimental group (...)
    Direct download (14 more)  
     
    Export citation  
     
    Bookmark  
  15.  17
    Computational Qualitative Economics – Using Computational Intelligence for Andvanced Learning of Economics in Knowledge Society.Ladislav Andrasik - 2015 - Creative and Knowledge Society 5 (2):1-15.
    In economics there are several complex learning themes and tasks connected with them difficult for deeper understanding of the learning subject. These are the reasons originating serious learning problems for students in the form of Virtual Environment because deeper understanding requires high level mathematical skills. Actually the most important feature for discerning this part of economics is the set of qualitative shapes emerging in discrete dynamic systems when they are undergoing iterations and/or experimentation with parameters and initial coordinates of variables. (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  23
    Too Old for Computers? The Longitudinal Relationship Between Stereotype Threat and Computer Use by Older Adults.João Mariano, Sibila Marques, Miguel R. Ramos, Filomena Gerardo & Hein de Vries - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17. The Affiliative Use of Emoji and Hashtags in the Black Lives Matter Movement in Twitter.Mark Alfano, Ritsaart Reimann, Ignacio Quintana, Marc Cheong & Colin Klein - 2022 - Social Science Computer Review (N/A).
    Protests and counter-protests seek to draw and direct attention and concern with confronting images and slogans. In recent years, as protests and counter-protests have partially migrated to the digital space, such images and slogans have also gone online. Two main ways in which these images and slogans are translated to the online space is through the use of emoji and hashtags. Despite sustained academic interest in online protests, hashtag activism and the use of emoji across social media platforms, little is (...)
     
    Export citation  
     
    Bookmark   2 citations  
  18.  13
    The use of cognitive psychology-based human-computer interaction tax system in ceramic industry tax collection and management and economic development of Jingdezhen city.Mingqing Jiao - 2022 - Frontiers in Psychology 13.
    This work aims to solve the complex problems of non-linearity, instability, and multiple economic factors in the tax forecast of the ceramic industry to ensure the sustainable development of the ceramic industry. The key influential indicators of the tax forecast are obtained by analyzing the principal components affecting the tax index. In addition, a human-computer interaction system is established based on cognitive psychology theory to improve the user-friendliness of tax analysis. At the same time, the tax data of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  27
    Ethical Attitude and Behaviors Regarding Computer Use.Lichun Chiang & Boywe Lee - 2011 - Ethics and Behavior 21 (6):481 - 497.
    This study explores the ethical attitudes, behaviors, and perceptions of a sampling of political science students in Taiwan. It investigates their intentions toward observing ethics in the area of digital rights, on topics such as the freedom of expression, freedom of association, equal access to information, confidentiality, security, and protection of intellectual property while using computers. Based on preliminary studies, a questionnaire was designed and distributed to 660 political science and public administration students throughout colleges in Taiwan. Data collected from (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20. On Computable Metaphysics: On the Uses and Limitations of Computational Metaphysics.Jason Megill & Dan Linford - 2018 - In Mirosław Szatkowski (ed.), Ontology of Theistic Beliefs: Meta-Ontological Perspectives. De Gruyter. pp. 93-112.
    Humans constantly produce strings of characters in symbolic languages, e.g., sentences in natural languages. We show that for any given moment in human history, the set of character strings that have been produced up to that moment, i.e., the sum total of human symbolic output up to that moment, is finite and so Turing computable. We then prove a much stronger result: a Turing machine can produce any particular set of symbolic output that we could possibly have produced. We then (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  21. Using mathematica to understand the computer proof of the Robbins conjecture.Branden Fitelson - manuscript
    mathematicians for over 60 years. Amazingly, the Argonne team's automated theorem-proving program EQP took only 8 days to find a proof of it. Unfortunately, the proof found by EQP is quite complex and difficult to follow. Some of the steps of the EQP proof require highly complex and unintuitive substitution strategies. As a result, it is nearly impossible to reconstruct or verify the computer proof of the Robbins conjecture entirely by hand. This is where the unique symbolic capabilities of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  14
    Computational opposition analysis using word embeddings: A method for strategising resonant informal argument.Cameron Shackell & Laurianne Sitbon - 2020 - Argument and Computation 10 (3):301-317.
    In informal argument, an essential step is to ask what will “resonate” with a particular audience and hence persuade. Marketers, for example, may recommend a certain colour for a new soda can becau...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  25
    Using background knowledge in case-based legal reasoning: A computational model and an intelligent learning environment.Vincent Aleven - 2003 - Artificial Intelligence 150 (1-2):183-237.
  24. Learning Computer Networks Using Intelligent Tutoring System.Mones M. Al-Hanjori, Mohammed Z. Shaath & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1).
    Intelligent Tutoring Systems (ITS) has a wide influence on the exchange rate, education, health, training, and educational programs. In this paper we describe an intelligent tutoring system that helps student study computer networks. The current ITS provides intelligent presentation of educational content appropriate for students, such as the degree of knowledge, the desired level of detail, assessment, student level, and familiarity with the subject. Our Intelligent tutoring system was developed using ITSB authoring tool for building ITS. A preliminary evaluation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  25.  67
    Using brain-computer interfaces: a scoping review of studies employing social research methods.Johannes Kögel, Jennifer R. Schmid, Ralf J. Jox & Orsolya Friedrich - 2019 - BMC Medical Ethics 20 (1):18.
    The rapid expansion of research on Brain-Computer Interfaces is not only due to the promising solutions offered for persons with physical impairments. There is also a heightened need for understanding BCIs due to the challenges regarding ethics presented by new technology, especially in its impact on the relationship between man and machine. Here we endeavor to present a scoping review of current studies in the field to gain insight into the complexity of BCI use. By examining studies related to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  26. One‐year‐old infants use teleological representations of actions productively.Gergely Csibra, Szilvia Bíró, Orsolya Koós & György Gergely - 2003 - Cognitive Science 27 (1):111-133.
    Two experiments investigated whether infants represent goal‐directed actions of others in a way that allows them to draw inferences to unobserved states of affairs (such as unseen goal states or occluded obstacles). We measured looking times to assess violation of infants' expectations upon perceiving either a change in the actions of computer‐animated figures or in the context of such actions. The first experiment tested whether infants would attribute a goal to an action that they had not seen completed. The (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   63 citations  
  27. Franklin, Holmes, and the epistemology of computer simulation.Wendy S. Parker - 2008 - International Studies in the Philosophy of Science 22 (2):165 – 183.
    Allan Franklin has identified a number of strategies that scientists use to build confidence in experimental results. This paper shows that Franklin's strategies have direct analogues in the context of computer simulation and then suggests that one of his strategies—the so-called 'Sherlock Holmes' strategy—deserves a privileged place within the epistemologies of experiment and simulation. In particular, it is argued that while the successful application of even several of Franklin's other strategies (or their analogues in simulation) may not be sufficient (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  28.  42
    Advancing the ethical use of digital data in human research: challenges and strategies to promote ethical practice.Karin Clark, Matt Duckham, Marilys Guillemin, Assunta Hunter, Jodie McVernon, Christine O’Keefe, Cathy Pitkin, Steven Prawer, Richard Sinnott, Deborah Warr & Jenny Waycott - 2019 - Ethics and Information Technology 21 (1):59-73.
    The proliferation of digital data and internet-based research technologies is transforming the research landscape, and researchers and research ethics communities are struggling to respond to the ethical issues being raised. This paper discusses the findings from a collaborative project that explored emerging ethical issues associated with the expanding use of digital data for research. The project involved consulting with researchers from a broad range of disciplinary fields. These discussions identified five key sets of issues and informed the development of guidelines (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  54
    Multiplex and Unfolding: Computer Simulation in Particle Physics.Martina Merz - 1999 - Science in Context 12 (2):293-316.
    The ArgumentWhat kind of objects are computer programs used for simulation purposes in scientific settings? The current investigation treats a special case. It focuses on “event generators,” the program packages that particle physicists construct and use to simulate mechanisms of particle production. The paper is an attempt to bring the multiplex and unfolding character of such knowledge objects to the fore: Multiple meanings and functions are embodied in the object and can be drawn out selectively according to the requirements (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  30. Computational Intelligence Part II Lecture 1: Identification Using Neural Networks.Farzaneh Abdollahi - 2009 - In L. Magnani (ed.), computational intelligence.
  31.  33
    Public perceptions of the use of artificial intelligence in Defence: a qualitative exploration.Lee Hadlington, Maria Karanika-Murray, Jane Slater, Jens Binder, Sarah Gardner & Sarah Knight - forthcoming - AI and Society:1-14.
    There are a wide variety of potential applications of artificial intelligence (AI) in Defence settings, ranging from the use of autonomous drones to logistical support. However, limited research exists exploring how the public view these, especially in view of the value of public attitudes for influencing policy-making. An accurate understanding of the public’s perceptions is essential for crafting informed policy, developing responsible governance, and building responsive assurance relating to the development and use of AI in military settings. This study is (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32. Computational Modelling for Alcohol Use Disorder.Matteo Colombo - forthcoming - Erkenntnis.
    In this paper, I examine Reinforcement Learning modelling practice in psychiatry, in the context of alcohol use disorders. I argue that the epistemic roles RL currently plays in the development of psychiatric classification and search for explanations of clinically relevant phenomena are best appreciated in terms of Chang’s account of epistemic iteration, and by distinguishing mechanistic and aetiological modes of computational explanation.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  33. Some Useful 16-Valued Logics: How a Computer Network Should Think.Yaroslav Shramko & Heinrich Wansing - 2005 - Journal of Philosophical Logic 34 (2):121-153.
    In Belnap's useful 4-valued logic, the set 2 = {T, F} of classical truth values is generalized to the set 4 = ������(2) = {Ø, {T}, {F}, {T, F}}. In the present paper, we argue in favor of extending this process to the set 16 = ᵍ (4) (and beyond). It turns out that this generalization is well-motivated and leads from the bilattice FOUR₂ with an information and a truth-and-falsity ordering to another algebraic structure, namely the trilattice SIXTEEN₃ with an (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   60 citations  
  34.  30
    Reconstructor: a computer program that uses three-valued logics to represent lack of information in empirical scientific contexts.Ariel Jonathan Roffé - 2020 - Journal of Applied Non-Classical Logics 30 (1):68-91.
    In this article, I develop three conceptual innovations within the area of formal metatheory, and present a computer program, called Reconstructor, that implements those developments. The first development consists in a methodology for testing formal reconstructions of scientific theories, which involves checking both whether translations of paradigmatically successful applications into models satisfy the formalisation of the laws, and also whether unsuccessful applications do not. I show how Reconstructor can help carry this out, since it allows the end-user to specify (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  35.  29
    An Assessment of Computer-Generated Stimuli for Use in Studies of Body Size Estimation and Bias.Joanna Alexi, Kendra Dommisse, Dominique Cleary, Romina Palermo, Nadine Kloth & Jason Bell - 2019 - Frontiers in Psychology 10.
    Inaccurate body size judgements are associated with body image disturbances, a clinical feature of many eating disorders. Accordingly, body related stimuli have become increasingly important in the study of estimation inaccuracies and body image disturbances. Technological advancements in the last decade have led to an increased use of computer generated (CG) body stimuli in body image research. However, recent face perception research has suggested that CG face stimuli are not recognised as readily and may not fully tap facial processing (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  23
    Cross-Modal Transfer Learning From EEG to Functional Near-Infrared Spectroscopy for Classification Task in Brain-Computer Interface System.Yuqing Wang, Zhiqiang Yang, Hongfei Ji, Jie Li, Lingyu Liu & Jie Zhuang - 2022 - Frontiers in Psychology 13.
    The brain-computer interface based on functional near-infrared spectroscopy has received more and more attention due to its vast application potential in emotion recognition. However, the relatively insufficient investigation of the feature extraction algorithms limits its use in practice. In this article, to improve the performance of fNIRS-based BCI, we proposed a method named R-CSP-E, which introduces EEG signals when computing fNIRS signals’ features based on transfer learning and ensemble learning theory. In detail, we used the Independent Component Analysis algorithm (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37. The Illusion of Agency in Human–Computer Interaction.Michael Madary - 2022 - Neuroethics 15 (1):1-15.
    This article makes the case that our digital devices create illusions of agency. There are times when users feel as if they are in control when in fact they are merely responding to stimuli on the screen in predictable ways. After the introduction, the second section of the article offers examples of illusions of agency that do not involve human–computer interaction in order to show that such illusions are possible and not terribly uncommon. The third and fourth sections of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  16
    Using Computational Neuroscience to Define Common Input to Spinal Motor Neurons.Tjeerd W. Boonstra, Simon F. Farmer & Michael Breakspear - 2016 - Frontiers in Human Neuroscience 10.
  39.  43
    Flexible Strategy Use in Young Children's Tic‐Tac‐Toe.Kevin Crowley & Robert S. Siegler - 1993 - Cognitive Science 17 (4):531-561.
    In domains with multiple competing goals, people face a basic challenge: How to make their strategy use flexible enough to deal with shifting circumstances without losing track of their overall objectives. This article examines how young children meet this challenge in one such domain, tic‐tac‐toe. Experiment 1 provides an overviews of development in the area; it indicates that children's tic‐tac‐toe strategies are rule based and that new rules are added one at a time. Experiment 2 demonstrates that even young children (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  40.  29
    Computing pagerank using power extrapolation.Christopher Manning - manuscript
    We present a novel technique for speeding up the computation of PageRank, a hyperlink-based estimate of the “importance” of Web pages, based on the ideas presented in [7]. The original PageRank algorithm uses the Power Method to compute successive iterates that converge to the principal eigenvector of the Markov matrix representing the Web link graph. The algorithm presented here, called Power Extrapolation, accelerates the convergence of the Power Method by subtracting off the error along several nonprincipal eigenvectors from the current (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  41. From data to phenomena and back again: computer-simulated signatures.Eran Tal - 2011 - Synthese 182 (1):117-129.
    This paper draws attention to an increasingly common method of using computer simulations to establish evidential standards in physics. By simulating an actual detection procedure on a computer, physicists produce patterns of data (‘signatures’) that are expected to be observed if a sought-after phenomenon is present. Claims to detect the phenomenon are evaluated by comparing such simulated signatures with actual data. Here I provide a justification for this practice by showing how computer simulations establish the reliability of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  42.  18
    Computing PageRank using Power Extrapolation.Dan Klein & Chris Manning - unknown
    Method by subtracting off the error along several nonprincipal eigenvectors from the current iterate of the Power Method, making use of known nonprincipal eigenvalues of the Web hyperlink matrix. Empirically, we show that using Power Extrapolation speeds up PageRank computation by 30% on a Web graph of 80 million nodes in realistic scenarios over the standard power method, in a way that is simple to understand and implement.
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  13
    Idealizations in Astrophysical Computer Simulations.Melissa Jacquart & Regy-Null R. Arcadia - 2023 - In Nora Mills Boyd, Siska De Baerdemaeker, Kevin Heng & Vera Matarese (eds.), Philosophy of Astrophysics: Stars, Simulations, and the Struggle to Determine What is Out There. Springer Verlag. pp. 2147483647-2147483647.
    This chapter examines some of the philosophical literature on idealizations in science and the epistemic challenges idealizations potentially pose for astrophysical methodology, particularly its use of computer simulations. We begin by surveying philosophical literature on idealization connected to (1) kinds of idealizations deployed in science, (2) the aims of idealization in science, and (3) various strategies for de-idealization. Using collisional ring galaxy simulations as a case study, we examine how these three themes play out in the context of astrophysical (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  15
    Artificial Intelligence-Based Human–Computer Interaction Technology Applied in Consumer Behavior Analysis and Experiential Education.Yanmin Li, Ziqi Zhong, Fengrui Zhang & Xinjie Zhao - 2022 - Frontiers in Psychology 13.
    In the course of consumer behavior, it is necessary to study the relationship between the characteristics of psychological activities and the laws of behavior when consumers acquire and use products or services. With the development of the Internet and mobile terminals, electronic commerce has become an important form of consumption for people. In order to conduct experiential education in E-commerce combined with consumer behavior, courses to understand consumer satisfaction. From the perspective of E-commerce companies, this study proposes to use artificial (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45. An Analysis of the Impact of Brain-Computer Interfaces on Autonomy.Orsolya Friedrich, Eric Racine, Steffen Steinert, Johannes Pömsl & Ralf J. Jox - 2018 - Neuroethics 14 (1):17-29.
    Research conducted on Brain-Computer Interfaces has grown considerably during the last decades. With the help of BCIs, users can gain a wide range of functions. Our aim in this paper is to analyze the impact of BCIs on autonomy. To this end, we introduce three abilities that most accounts of autonomy take to be essential: the ability to use information and knowledge to produce reasons; the ability to ensure that intended actions are effectively realized ; and the ability to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  46. Using a mobile Virtual Reality and computer game to improve visuospatial self-efficacy in middle school students.Irina Kuznetcova, Michael Glassman, Shantanu Tilak, Ziye Wen, Marvin Evans, Logan Pelfrey & Tzu-Jung Lin - 2022 - Computers and Education 192.
    Visuospatial (VS) skills, or one’s ability to mentally manipulate spatial information about objects, are critical to STEM enrollment, retention, and achievement. Low level of VS skills may deter some people from joining the STEM workforce or complicate their learning experience. While there is plenty of evidence suggesting that VS skills can be improved through training, few accessible training programs exist as of now, particularly for younger students. The current study proposes a new direction of VS training focusing on the development (...)
     
    Export citation  
     
    Bookmark  
  47. Distributed Cognition, Toward a New Foundation for Human-Computer Interaction Research.David Kirsh, Jim Hollan & Edwin Hutchins - 2000 - ACM Transactions on Computer-Human Interaction 7 (2):174-196.
    We are quickly passing through the historical moment when people work in front of a single computer, dominated by a small CRT and focused on tasks involving only local information. Networked computers are becoming ubiquitous and are playing increasingly significant roles in our lives and in the basic infrastructure of science, business, and social interaction. For human-computer interaction o advance in the new millennium we need to better understand the emerging dynamic of interaction in which the focus task (...)
    Direct download  
     
    Export citation  
     
    Bookmark   78 citations  
  48.  46
    Use case cards: a use case reporting framework inspired by the European AI Act.Emilia Gómez, Sandra Baldassarri, David Fernández-Llorca & Isabelle Hupont - 2024 - Ethics and Information Technology 26 (2):1-23.
    Despite recent efforts by the Artificial Intelligence (AI) community to move towards standardised procedures for documenting models, methods, systems or datasets, there is currently no methodology focused on use cases aligned with the risk-based approach of the European AI Act (AI Act). In this paper, we propose a new framework for the documentation of use cases that we call use case cards, based on the use case modelling included in the Unified Markup Language (UML) standard. Unlike other documentation methodologies, we (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  76
    Using computational models to discover and understand mechanisms.William Bechtel - 2016 - Studies in History and Philosophy of Science Part A 56:113-121.
  50. Philosophy of Mind Is (in Part) Philosophy of Computer Science.Darren Abramson - 2011 - Minds and Machines 21 (2):203-219.
    In this paper I argue that whether or not a computer can be built that passes the Turing test is a central question in the philosophy of mind. Then I show that the possibility of building such a computer depends on open questions in the philosophy of computer science: the physical Church-Turing thesis and the extended Church-Turing thesis. I use the link between the issues identified in philosophy of mind and philosophy of computer science to respond (...)
    Direct download (14 more)  
     
    Export citation  
     
    Bookmark   6 citations  
1 — 50 / 973