Results for 'Computer tournaments'

968 found
Order:
  1.  49
    Effective choice in the single-shot Prisoner's Dilemma tournament.Doede Nauta & Jeljer Hoekstra - 1995 - Theory and Decision 39 (1):1-30.
  2. Oyun: A New, Free Program for Iterated Prisoner’s Dilemma Tournaments in the Classroom.Charles H. Pence & Lara Buchak - 2012 - Evolution Education and Outreach 5 (3):467-476.
    Evolutionary applications of game theory present one of the most pedagogically accessible varieties of genuine, contemporary theoretical biology. We present here Oyun (OY-oon, http://charlespence.net/oyun), a program designed to run iterated prisoner’s dilemma tournaments, competitions between prisoner’s dilemma strategies developed by the students themselves. Using this software, students are able to readily design and tweak their own strategies, and to see how they fare both in round-robin tournaments and in “evolutionary” tournaments, where the scores in a given “generation” (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  3.  13
    The Sportification of Amateur-level Competitive Computer Gaming: The Case of a Student Esports Club.N. S. Aleinikov - 2020 - Sociology of Power 32 (3):91-113.
    This article presents the results of an empirical study of the “sportification” of amateur-level competitive computer gaming. How do amateur players, who are unlikely to become professional esports players, turn what is considered to be enjoyable entertainment into a collective activity that demonstrates traits traditionally associated with professional sports, such as self-discipline, a focus on achieving results and overcoming personal limitations? Ethnographic research, consisting of in-depth interviews and participant observations, was conducted in the last quarter of 2019 based on (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4. In Defense of Moderate Envy.Bernd Lahno - 2000 - Analyse & Kritik 22 (1):98-113.
    In contrast to Axelrod’s advice “don’t be envious” it is argued that the emotion of envy may enhance cooperation. TIT FOR TAT does exhibit a certain degree of envy. But, it does so in inconsistent ways. Two variants of TIT FOR TAT are introduced and their strategic properties are analyzed. Both generate the very same actual play as TIT FOR TAT in a computer tournament without noise. However, if noise is introduced they display some greater degree of stability. This (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  5.  27
    Cooperation.J. McKenzie Alexander - 2008 - In Sahorta Sarkar & Anya Plutynski (eds.), Companion to the Philosophy of Biology. Blackwell. pp. 415-430.
    This chapter contains section titled: Kin Selection Reciprocity Group Selection Coercion Mutualism Byproduct Mutualism Local Interactions References.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  6.  2
    The weakness of the Erdős–Moser theorem under arithmetic reductions.Ludovic Levy Patey & Ahmed Mimouni - forthcoming - Journal of Mathematical Logic.
    The Erdős–Moser ([Formula: see text]) theorem says that every infinite tournament admits an infinite transitive subtournament. We study the computational behavior of the [Formula: see text] theorem with respect to the arithmetic hierarchy, and prove that [Formula: see text] instances of [Formula: see text] admit low[Formula: see text] solutions for every [Formula: see text], and that if a set [Formula: see text] is not arithmetical, then every instance of [Formula: see text] admits a solution relative to which [Formula: see text] (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7. Wisdom of Crowds, Wisdom of the Few: Expertise versus Diversity across Epistemic Landscapes.Patrick Grim, Daniel J. Singer, Aaron Bramson, Bennett Holman, Sean McGeehan & William J. Berger - manuscript
    In a series of formal studies and less formal applications, Hong and Page offer a ‘diversity trumps ability’ result on the basis of a computational experiment accompanied by a mathematical theorem as explanatory background (Hong & Page 2004, 2009; Page 2007, 2011). “[W]e find that a random collection of agents drawn from a large set of limited-ability agents typically outperforms a collection of the very best agents from that same set” (2004, p. 16386). The result has been extremely influential as (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  8.  49
    Structured Pigeonhole Principle, Search Problems and Hard Tautologies.Jan Krajíček - 2005 - Journal of Symbolic Logic 70 (2):619 - 630.
    We consider exponentially large finite relational structures (with the universe {0.1}ⁿ) whose basic relations are computed by polynomial size (nO(1)) circuits. We study behaviour of such structures when pulled back by P/poly maps to a bigger or to a smaller universe. In particular, we prove that: 1. If there exists a P/poly map g: {0.1} → {0.1}m, n < m, iterable for a proof system then a tautology (independent of g) expressing that a particular size n set is dominating in (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  9. Solving Uncompromising Problems With Lexicase Selection.T. Helmuth, L. Spector & J. Matheson - 2015 - IEEE Transactions on Evolutionary Computation 19 (5):630–643.
    We describe a broad class of problems, called “uncompromising problems,” which are characterized by the requirement that solutions must perform optimally on each of many test cases. Many of the problems that have long motivated genetic programming research, including the automation of many traditional programming tasks, are uncompromising. We describe and analyze the recently proposed “lexicase” parent selection algorithm and show that it can facilitate the solution of uncompromising problems by genetic programming. Unlike most traditional parent selection techniques, lexicase selection (...)
    No categories
     
    Export citation  
     
    Bookmark  
  10. Randomness and Recursive Enumerability.Siam J. Comput - unknown
    One recursively enumerable real α dominates another one β if there are nondecreasing recursive sequences of rational numbers (a[n] : n ∈ ω) approximating α and (b[n] : n ∈ ω) approximating β and a positive constant C such that for all n, C(α − a[n]) ≥ (β − b[n]). See [R. M. Solovay, Draft of a Paper (or Series of Papers) on Chaitin’s Work, manuscript, IBM Thomas J. Watson Research Center, Yorktown Heights, NY, 1974, p. 215] and [G. J. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  11. The fortieth annual lecture series 1999-2000.Brain Computations & an Inevitable Conflict - 2000 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie 31:199-200.
  12.  10
    Computer Science Logic: 11th International Workshop, CSL'97, Annual Conference of the EACSL, Aarhus, Denmark, August 23-29, 1997, Selected Papers.M. Nielsen, Wolfgang Thomas & European Association for Computer Science Logic - 1998 - Springer Verlag.
    This book constitutes the strictly refereed post-workshop proceedings of the 11th International Workshop on Computer Science Logic, CSL '97, held as the 1997 Annual Conference of the European Association on Computer Science Logic, EACSL, in Aarhus, Denmark, in August 1997. The volume presents 26 revised full papers selected after two rounds of refereeing from initially 92 submissions; also included are four invited papers. The book addresses all current aspects of computer science logics and its applications and thus (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  6
    A Model for Proustian Decay.Computer Lars - 2024 - Nordic Journal of Aesthetics 33 (67).
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  87
    Computer Simulation Validation: Fundamental Concepts, Methodological Frameworks, and Philosophical Perspectives.Claus Beisbart & Nicole J. Saam (eds.) - 2019 - Springer Verlag.
    This unique volume introduces and discusses the methods of validating computer simulations in scientific research. The core concepts, strategies, and techniques of validation are explained by an international team of pre-eminent authorities, drawing on expertise from various fields ranging from engineering and the physical sciences to the social sciences and history. The work also offers new and original philosophical perspectives on the validation of simulations. Topics and features: introduces the fundamental concepts and principles related to the validation of (...) simulations, and examines philosophical frameworks for thinking about validation; provides an overview of the various strategies and techniques available for validating simulations, as well as the preparatory steps that have to be taken prior to validation; describes commonly used reference points and mathematical frameworks applicable to simulation validation; reviews the legal prescriptions, and the administrative and procedural activities related to simulation validation; presents examples of best practice that demonstrate how methods of validation are applied in various disciplines and with different types of simulation models; covers important practical challenges faced by simulation scientists when applying validation methods and techniques; offers a selection of general philosophical reflections that explore the significance of validation from a broader perspective. This truly interdisciplinary handbook will appeal to a broad audience, from professional scientists spanning all natural and social sciences, to young scholars new to research with computer simulations. Philosophers of science, and methodologists seeking to increase their understanding of simulation validation, will also find much to benefit from in the text. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  15. Disclosive computer ethics.Philip Brey - 2000 - Acm Sigcas Computers and Society 30 (4):10-16.
    This essay provides a critique of mainstream computer ethics and argues for the importance of a complementary approach called disclosive computer ethics, which is concerned with the moral deciphering of embedded values and norms in computer systems, applications and practices. Also, four key values are proposed as starting points for disclosive studies in computer ethics: justice, autonomy, democracy and privacy. Finally, it is argued that research in disclosive computer ethics should be multi-level and interdisciplinary, distinguishing (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   44 citations  
  16. (1 other version)Computer Simulations.Paul Humphreys - 1990 - PSA: Proceedings of the Biennial Meeting of the Philosophy of Science Association 1990:497 - 506.
    This article provides a survey of some of the reasons why computational approaches have become a permanent addition to the set of scientific methods. The reasons for this require us to represent the relation between theories and their applications in a different way than do the traditional logical accounts extant in the philosophical literature. A working definition of computer simulations is provided and some properties of simulations are explored by considering an example from quantum chemistry.
    Direct download  
     
    Export citation  
     
    Bookmark   48 citations  
  17. Computer Simulations, Machine Learning and the Laplacean Demon: Opacity in the Case of High Energy Physics.Florian J. Boge & Paul Grünke - forthcoming - In Andreas Kaminski, Michael Resch & Petra Gehring (eds.), The Science and Art of Simulation II.
    In this paper, we pursue three general aims: (I) We will define a notion of fundamental opacity and ask whether it can be found in High Energy Physics (HEP), given the involvement of machine learning (ML) and computer simulations (CS) therein. (II) We identify two kinds of non-fundamental, contingent opacity associated with CS and ML in HEP respectively, and ask whether, and if so how, they may be overcome. (III) We address the question of whether any kind of opacity, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  18.  22
    Computer simulation of the phenomenological transport coefficient in the lattice gas and Fick's First Law.I. V. Belova, M. J. Brown & G. E. Murch † - 2005 - Philosophical Magazine 85 (14):1495-1506.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19. Computer Ethics: Encryption: Dvd.Ken Knisely & Patrick Sullivan - 2001 - Milk Bottle Productions.
    Should all digital communication be accessible to government inspection? Is robust cryptography in the hands of the public a threat to our national security? With Dorothy Denning and Patrick Sullivan.
     
    Export citation  
     
    Bookmark  
  20. Three paradigms of computer science.Amnon H. Eden - 2007 - Minds and Machines 17 (2):135-167.
    We examine the philosophical disputes among computer scientists concerning methodological, ontological, and epistemological questions: Is computer science a branch of mathematics, an engineering discipline, or a natural science? Should knowledge about the behaviour of programs proceed deductively or empirically? Are computer programs on a par with mathematical objects, with mere data, or with mental processes? We conclude that distinct positions taken in regard to these questions emanate from distinct sets of received beliefs or paradigms within the discipline: (...)
    Direct download (13 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  21. Computer sciences meet evolutionary biology: issues in gradualism.Philippe Huneman - 2012 - In Torres Juan, Pombo Olga, Symons John & Rahman Shahid (eds.), Special sciences and the Unity of Science. Springer.
     
    Export citation  
     
    Bookmark   4 citations  
  22.  28
    Computer Studies of Turing Machine Problems.Shen Lin, Tibor Rado, Allen H. Brady & Milton W. Green - 1975 - Journal of Symbolic Logic 40 (4):617-617.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. The philosophical novelty of computer simulation methods.Paul Humphreys - 2009 - Synthese 169 (3):615 - 626.
    Reasons are given to justify the claim that computer simulations and computational science constitute a distinctively new set of scientific methods and that these methods introduce new issues in the philosophy of science. These issues are both epistemological and methodological in kind.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   173 citations  
  24. Philosophy of Computer Science.William J. Rapaport - 2005 - Teaching Philosophy 28 (4):319-341.
    There are many branches of philosophy called “the philosophy of X,” where X = disciplines ranging from history to physics. The philosophy of artificial intelligence has a long history, and there are many courses and texts with that title. Surprisingly, the philosophy of computer science is not nearly as well-developed. This article proposes topics that might constitute the philosophy of computer science and describes a course covering those topics, along with suggested readings and assignments.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  25. The Ethics of Computer Games.Miguel Sicart - 2011 - MIT Press.
    Despite the emergence of computer games as a dominant cultural industry, we know little or nothing about the ethics of computer games. Considerations of the morality of computer games seldom go beyond intermittent portrayals of them in the mass media as training devices for teenage serial killers. In this first scholarly exploration of the subject, Miguel Sicart addresses broader issues about the ethics of games, the ethics of playing the games, and the ethical responsibilities of game designers. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   28 citations  
  26. Computer Crime and Victim Justice.John T. Chu - 1991 - In Diane Sank & David I. Caplan (eds.), To Be a Victim: Encounters with Crime and Injustice. Plenum. pp. 217.
     
    Export citation  
     
    Bookmark  
  27. Der Computer als Superman: Zur naturalistischen Elimination des Handlungsobjektes.Friedrich Rapp - 1991 - Ethik Und Sozialwissenschaften 2 (2):324.
    No categories
     
    Export citation  
     
    Bookmark  
  28.  13
    Computer simulation in data analysis: A case study from particle physics.Brigitte Falkenburg - 2024 - Studies in History and Philosophy of Science Part A 105 (C):99-108.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Computer knows best? The need for value-flexibility in medical AI.Rosalind J. McDougall - 2019 - Journal of Medical Ethics 45 (3):156-160.
    Artificial intelligence (AI) is increasingly being developed for use in medicine, including for diagnosis and in treatment decision making. The use of AI in medical treatment raises many ethical issues that are yet to be explored in depth by bioethicists. In this paper, I focus specifically on the relationship between the ethical ideal of shared decision making and AI systems that generate treatment recommendations, using the example of IBM’s Watson for Oncology. I argue that use of this type of system (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   57 citations  
  30.  38
    The computer, hypertext, and classical studies.Jay David Bolter - 1991 - American Journal of Philology 112 (4).
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  13
    Computer systems that learn.Alberto Segre & Geoffrey Gordon - 1993 - Artificial Intelligence 62 (2):363-378.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  46
    Form and Content in Computer Science.Marvin Minsky - unknown
    An excessive preoccupation with formalism is impeding the development of computer science. Form- content confusion is discussed relative to three areas: theory of computation, programming languages, and education.
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  33.  88
    Computer Art, Technology, and the Medium.Christopher Bartel - 2022 - Being and Value in Technology.
    Technological advancements often lead to revolutions in the creation of art; but, what is unclear is whether such advancements always correspond to revolutions regarding the artistic medium. The notion of an artistic medium is central to our thinking about, engagement with, and appreciation of art. Accounts of the interpretation, understanding, and experience of art must at some point grapple with the role of the artistic medium against such endeavors. Moreover, artists do not choose their medium by accident, but presumably do (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. A Philosophy of Computer Art.Dominic Lopes - 2009 - New York: Routledge.
    What is computer art? Do the concepts we usually employ to talk about art, such as ‘meaning’, ‘form’ or ‘expression’ apply to computer art? _A Philosophy of Computer Art_ is the first book to explore these questions. Dominic Lopes argues that computer art challenges some of the basic tenets of traditional ways of thinking about and making art and that to understand computer art we need to place particular emphasis on terms such as ‘interactivity’ and (...)
  35.  46
    Computer-Generated Art, Music, and Literature: Philosophical Conundrums.Joseph S. Fulda - 1993 - SIGART Bulletin 4 (1):6-7.
    Considers the question of the authorship of the works in the title from a /philosophical/, as opposed to legal, standpoint, using the sense-reference dichotomy, intension-extension dichotomy, and procedural knowledge-declarative knowledge dichotomy. Reaches no conclusion.
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  28
    Pitfalls in computer housekeeping by doctors and nurses in KwaZulu-Natal: No malicious intent.Caron Jack, Yashik Singh & Maurice Mars - 2013 - BMC Medical Ethics 14 (S1):S8.
    IntroductionInformation and communication technologies are becoming an integral part of medical practice, research and administration and their use will grow as telemedicine and electronic medical record use become part of routine practice. Security in maintaining patient data is important and there is a statuary obligation to do so, but few health professionals have been trained on how to achieve this. There is no information on the use of computers and email by doctors and nurses in South Africa in the workplace (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  37. Können Computer kreativ sein.Andrea Anna Reichenberger - 2005 - In Günter Abel (ed.), Kreativität: XX. Deutscher Kongress für Philosophie, 26.-30. September 2005 in Berlin : Sektionsbeiträge. Berlin: Universitätsverlag der TU Berlin. pp. 245-256.
     
    Export citation  
     
    Bookmark  
  38.  56
    Testimony and Computer Proof.Kai-Yee Wong - 2008 - Proceedings of the Xxii World Congress of Philosophy 53:317-323.
    This article aims to evaluate the purported empirical character of computer-assisted proof, as suggested by Thomas Tymoczko and others. Tymoczko famously argued that the proof of the Four-Color Theorem introduced a new, empirical method of proof, forcing us to modify the traditional conception of mathematical argument as a priori reasoning. Detlefsen and Luker contended that Tymoczko’s suggestion entailed that typically mathematical proofs were empirical. My chief interest is to raise some objections to a line of thought common to both (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  9
    Intelligent Data Mining of Computer-Aided Extension Residential Building Design Based on Algorithm Library.Gao Zhihui & Zou Guangtian - 2021 - Complexity 2021:1-9.
    In recent years, with the development of construction industry, more scientific, systematic, fast, and intelligent calculation methods are needed to coordinate urban development and fierce market competition, and mathematical algorithm library plays an important role in artificial intelligence. Therefore, the author uses computer mathematical algorithm and extension theory to study and analyze the residential building design and intelligent data mining. It is found that the research of the computer-aided expression method of extension building planning is mainly the expression (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  81
    Computer Algorithms, Market Manipulation and the Institutionalization of High Frequency Trading.Jakob Arnoldi - 2016 - Theory, Culture and Society 33 (1):29-52.
    The article discusses the use of algorithmic models in finance (algo or high frequency trading). Algo trading is widespread but also somewhat controversial in modern financial markets. It is a form of automated trading technology, which critics claim can, among other things, lead to market manipulation. Drawing on three cases, this article shows that manipulation also can happen in the reverse way, meaning that human traders attempt to make algorithms ‘make mistakes’ by ‘misleading’ them. These attempts to manipulate are very (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  41. Computer verification for historians of philosophy.Landon D. C. Elkind - 2022 - Synthese 200 (3):1-28.
    Interactive theorem provers might seem particularly impractical in the history of philosophy. Journal articles in this discipline are generally not formalized. Interactive theorem provers involve a learning curve for which the payoffs might seem minimal. In this article I argue that interactive theorem provers have already demonstrated their potential as a useful tool for historians of philosophy; I do this by highlighting examples of work where this has already been done. Further, I argue that interactive theorem provers can continue to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Paul M. kjeldergaard.Pittsburgh Computations Centers - 1968 - In T. Dixon & Deryck Horton (eds.), Verbal Behavior and General Behavior Theory. Prentice-Hall.
    No categories
     
    Export citation  
     
    Bookmark  
  43.  45
    Phase change: the computer revolution in science and mathematics.Douglas S. Robertson - 2003 - New York: Oxford University Press.
    Robertson's earlier work, The New Renaissance projected the likely future impact of computers in changing our culture. Phase Change builds on and deepens his assessment of the role of the computer as a tool driving profound change by examining the role of computers in changing the face of the sciences and mathematics. He shows that paradigm shifts in understanding in science have generally been triggered by the availability of new tools, allowing the investigator a new way of seeing into (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  44.  16
    Computer Programming and Formal Systems.J. C. Shepherdson, P. Braffort & D. Hirschberg - 1965 - Philosophical Quarterly 15 (61):371.
  45.  61
    Insights in How Computer Science can be a Science.Robert W. P. Luk - 2020 - Science and Philosophy 8 (2):17-46.
    Recently, information retrieval is shown to be a science by mapping information retrieval scientific study to scientific study abstracted from physics. The exercise was rather tedious and lengthy. Instead of dealing with the nitty gritty, this paper looks at the insights into how computer science can be made into a science by using that methodology. That is by mapping computer science scientific study to the scientific study abstracted from physics. To show the mapping between computer science and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  46.  60
    Philosophical Inquiry into Computer Intentionality: Machine Learning and Value Sensitive Design.Dmytro Mykhailov - 2023 - Human Affairs 33 (1):115-127.
    Intelligent algorithms together with various machine learning techniques hold a dominant position among major challenges for contemporary value sensitive design. Self-learning capabilities of current AI applications blur the causal link between programmer and computer behavior. This creates a vital challenge for the design, development and implementation of digital technologies nowadays. This paper seeks to provide an account of this challenge. The main question that shapes the current analysis is the following: What conceptual tools can be developed within the value (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47.  30
    The computer as a person.Lars-Erik Janlert - 1987 - Journal for the Theory of Social Behaviour 17 (3):321–341.
  48. Computer-Aided Argument Mapping and the Teaching of Critical Thinking (Part 1).Martin Davies - 2012 - Inquiry: Critical Thinking Across the Disciplines 27 (2):15-30.
    This paper is in two parts. Part I outlines three traditional approaches to the teaching of critical thinking: the normative, cognitive psychology, and educational approaches. Each of these approaches is discussed in relation to the influences of various methods of critical thinking instruction. The paper contrasts these approaches with what I call the “visualisation” approach. This approach is explained with reference to computer-aided argument mapping (CAAM) which uses dedicated computer software to represent inferences between premise and conclusions. The (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  49. Using computer technology for teaching philosophy.Ron Barnette - 1998 - In Terrell Ward Bynum & James Moor (eds.), The Digital Phoenix: How Computers are Changing Philosophy. Cambridge: Blackwell. pp. 393.
  50.  37
    Towards computer aided mathematics.Christoph Benzmüller - 2006 - Journal of Applied Logic 4 (4):359-365.
1 — 50 / 968