Results for 'applied computation'

975 found
Order:
  1. Applying Computer Software Technology to Develop English as a Foreign Language Vocabulary Acquisition.Rowles Phillip - 2010 - Fenomenologia. Diálogos Possíveis Campinas: Alínea/Goiânia: Editora da Puc Goiás 10:91-100.
     
    Export citation  
     
    Bookmark  
  2.  24
    Ethics–a Curriculum Enhancement Initiative in Applied Computer Science Technology Degree Programs.John P. Buerck - 2002 - Teaching Business Ethics 6 (2):167-177.
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  25
    Towards applied theories based on computability logic.Giorgi Japaridze - 2010 - Journal of Symbolic Logic 75 (2):565-601.
    Computability logic (CL) is a recently launched program for redeveloping logic as a formal theory of computability, as opposed to the formal theory of truth that logic has more traditionally been. Formulas in it represent computational problems, "truth" means existence of an algorithmic solution, and proofs encode such solutions. Within the line of research devoted to finding axiomatizations for ever more expressive fragments of CL, the present paper introduces a new deductive system CL12 and proves its soundness and completeness with (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  4.  33
    Reference and computation: an essay in applied philosophy of language.Amichai Kronfeld - 1990 - New York: Cambridge University Press.
    This book deals with a major problem in the study of language: the problem of reference. The ease with which we refer to things in conversation is deceptive. Upon closer scrutiny, it turns out that we hardly ever tell each other explicitly what object we mean, although we expect our interlocutor to discern it. Amichai Kronfeld provides an answer to two questions associated with this: how do we successfully refer, and how can a computer be programmed to achieve this? Beginning (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  5. Computational Intelligence Approaches and Methods for Security Engineering-Development of an Attack Packet Generator Applying an NP to the Intelligent APS.Wankyung Kim & Wooyoung Soh - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 4252--709.
  6.  3
    Computational Models Applied to Various Philosophical Topics.Nathan Gabriel - 2023 - Dissertation, University of California, Irvine
    This dissertation investigates some philosophical issues using computational models. Chapter 1 presents a Lewis-Skyrms signaling game that can exhibit a type of compositionality novel to the signaling game literature. The structure of the signaling game is motivated by an analogy to the alarm calls of putty-nosed monkeys (Cercopithecus nictitans). Putty-nosed monkeys display a compositional system of alarm calls with a semantics that is sensitive to the ordering of terms. This sensitivity to the ordering of terms has not been previously modeled (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  35
    Evaluating the Theoretic Adequacy and Applied Potential of Computational Models of the Spacing Effect.Matthew M. Walsh, Kevin A. Gluck, Glenn Gunzelmann, Tiffany Jastrzembski & Michael Krusmark - 2018 - Cognitive Science 42 (S3):644-691.
    The spacing effect is among the most widely replicated empirical phenomena in the learning sciences, and its relevance to education and training is readily apparent. Yet successful applications of spacing effect research to education and training is rare. Computational modeling can provide the crucial link between a century of accumulated experimental data on the spacing effect and the emerging interest in using that research to enable adaptive instruction. In this paper, we review relevant literature and identify 10 criteria for rigorously (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  8.  23
    Applied Mathematics in Eleventh Century Al-Andalus: Ibn Mucadh al-Jayyan and his Computation of Astrological Houses and Aspects.Jan P. Hogendijk - 2005 - Centaurus 47 (2):87-114.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  9.  28
    Data-Driven Dialogue Models: Applying Formal and Computational Tools to the Study of Financial And Moral Dialogues.Olena Yaskorska-Shah - 2020 - Studies in Logic, Grammar and Rhetoric 63 (1):185-208.
    This paper proposes two formal models for understanding real-life dialogues, aimed at capturing argumentative structures performatively enacted during conversations. In the course of the investigation, two types of discourse with a high degree of well-structured argumentation were chosen: moral debate and financial communication. The research project found itself confronted by a need to analyse, structure and formally describe large volumes of textual data, where this called for the application of computational tools. It is expected that the results of the proposed (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  35
    Hebrew Computational Linguistics: A Bulletin for Formal, Computational, Applied Linguistics, and Modern Hebrew.Alan S. Kaye & Ora Scharzwald - 1982 - Journal of the American Oriental Society 102 (1):195.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  23
    Harnessing Computational Complexity Theory to Model Human Decision‐making and Cognition.Juan Pablo Franco & Carsten Murawski - 2023 - Cognitive Science 47 (6):e13304.
    A central aim of cognitive science is to understand the fundamental mechanisms that enable humans to navigate and make sense of complex environments. In this letter, we argue that computational complexity theory, a foundational framework for evaluating computational resource requirements, holds significant potential in addressing this challenge. As humans possess limited cognitive resources for processing vast amounts of information, understanding how humans perform complex cognitive tasks requires comprehending the underlying factors that drive information processing demands. Computational complexity theory provides a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  75
    Computer Ethics as a Field of Applied Ethics.Herman T. Tavani - 2012 - Journal of Information Ethics 21 (2):52-70.
    The present essay includes an overview of key milestones in the development of computer ethics as a field of applied ethics. It also describes the ongoing debate about the proper scope of CE, as a subfield both in applied ethics and computer science. Following a brief description of the cluster of ethical issues that CE scholars and practitioners have generally considered to be the standard or "mainstream" issues comprising the field thus far, the essay speculates about the future (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  29
    Computational Philosophy of Science.Paul Thagard - 1988 - MIT Press.
    By applying research in artificial intelligence to problems in the philosophy of science, Paul Thagard develops an exciting new approach to the study of scientific reasoning. This approach uses computational ideas to shed light on how scientific theories are discovered, evaluated, and used in explanations. Thagard describes a detailed computational model of problem solving and discovery that provides a conceptually rich yet rigorous alternative to accounts of scientific knowledge based on formal logic, and he uses it to illuminate such topics (...)
    Direct download  
     
    Export citation  
     
    Bookmark   232 citations  
  14. Computation as Involving Content: A Response to Egan.Christopher Peacocke - 1999 - Mind and Language 14 (2):195-202.
    Only computational explanations of a content‐involving sort can answer certain ‘how’‐questions; can support content‐involving counterfactuals; and have the generality characteristic of psychological explanations. Purely formal characteriza‐tions of computations have none of these properties, and do not determine content. These points apply not only to psychological explanation, but to Turing machines themselves. Computational explanations which involve content are not opposed to naturalism. They are also required if we are to explain the content‐involving properties of mental states.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  15.  27
    The Origins of Humanities Computing and the Digital Humanities Turn.Dino Buzzetti - 2019 - Humanist Studies and the Digital Age 6 (1):32-58.
    At its beginnings Humanities Computing was characterized by a primary interest in methodological issues and their epistemological background. Subsequently, Humanities Computing practice has been prevailingly driven by technological developments and the main concern has shifted from content processing to the representation in digital form of documentary sources. The Digital Humanities turn has brought more to the fore artistic and literary practice in direct digital form, as opposed to a supposedly commonplace application of computational methods to scholarly research. As an example (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  15
    Artificial Intelligence-Based Human–Computer Interaction Technology Applied in Consumer Behavior Analysis and Experiential Education.Yanmin Li, Ziqi Zhong, Fengrui Zhang & Xinjie Zhao - 2022 - Frontiers in Psychology 13.
    In the course of consumer behavior, it is necessary to study the relationship between the characteristics of psychological activities and the laws of behavior when consumers acquire and use products or services. With the development of the Internet and mobile terminals, electronic commerce has become an important form of consumption for people. In order to conduct experiential education in E-commerce combined with consumer behavior, courses to understand consumer satisfaction. From the perspective of E-commerce companies, this study proposes to use artificial (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17. Neural and super-Turing computing.Hava T. Siegelmann - 2003 - Minds and Machines 13 (1):103-114.
    ``Neural computing'' is a research field based on perceiving the human brain as an information system. This system reads its input continuously via the different senses, encodes data into various biophysical variables such as membrane potentials or neural firing rates, stores information using different kinds of memories (e.g., short-term memory, long-term memory, associative memory), performs some operations called ``computation'', and outputs onto various channels, including motor control commands, decisions, thoughts, and feelings. We show a natural model of neural computing (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  18.  71
    The elementary computable functions over the real numbers: applying two new techniques. [REVIEW]Manuel L. Campagnolo & Kerry Ojakian - 2008 - Archive for Mathematical Logic 46 (7-8):593-627.
    The basic motivation behind this work is to tie together various computational complexity classes, whether over different domains such as the naturals or the reals, or whether defined in different manners, via function algebras (Real Recursive Functions) or via Turing Machines (Computable Analysis). We provide general tools for investigating these issues, using two techniques we call approximation and lifting. We use these methods to obtain two main theorems. First, we provide an alternative proof of the result from Campagnolo et al. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Applications of fuzzy theory in applied sciences and computer applications.Animesh Kumar Sharma (ed.) - 2024 - New York: Nova Science Publishers.
    In the realm of computational intelligence, the age-old adage, "not everything is black and white," has never been more pertinent. Through the lens of fuzzy logic and neutrosophic systems, Applications of Fuzzy Theory in Applied Sciences and Computer Applications, unravels the complex tapestry of uncertainty, imprecision, and subjectivity in real-world scenarios. This book stands as a testament to the power of fuzzy systems in bridging the gap between theoretical concepts and their pragmatic applications. Chapter one introduces readers to the (...)
     
    Export citation  
     
    Bookmark  
  20.  30
    Computational complexity theory, edited by Juris Hartmanis, Proceedings of symposia in applied mathematics, vol. 38, American Mathematical Society, Providence1989, ix + 128 pp. [REVIEW]Uwe Schoning - 1991 - Journal of Symbolic Logic 56 (1):335-336.
  21. Responsible computers? A case for ascribing quasi-responsibility to computers independent of personhood or agency.Bernd Carsten Stahl - 2006 - Ethics and Information Technology 8 (4):205-213.
    There has been much debate whether computers can be responsible. This question is usually discussed in terms of personhood and personal characteristics, which a computer may or may not possess. If a computer fulfils the conditions required for agency or personhood, then it can be responsible; otherwise not. This paper suggests a different approach. An analysis of the concept of responsibility shows that it is a social construct of ascription which is only viable in certain social contexts and which serves (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   22 citations  
  22.  72
    The relationship between the uniqueness of computer ethics and its independence as a discipline in applied ethics.Kenneth Einar Himma - 2003 - Ethics and Information Technology 5 (4):225-237.
    A number of different uniquenessclaims have been made about computer ethics inorder to justify characterizing it as adistinct subdiscipline of applied ethics. Iconsider several different interpretations ofthese claims and argue, first, that none areplausible and, second, that none provideadequate justification for characterizingcomputer ethics as a distinct subdiscipline ofapplied ethics. Even so, I argue that computerethics shares certain important characteristicswith medical ethics that justifies treatingboth as separate subdisciplines of appliedethics.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  23.  94
    About the warrants of computer-based empirical knowledge.Anouk Barberousse & Marion Vorms - 2014 - Synthese 191 (15):3595-3620.
    Computer simulations are widely used in current scientific practice, as a tool to obtain information about various phenomena. Scientists accordingly rely on the outputs of computer simulations to make statements about the empirical world. In that sense, simulations seem to enable scientists to acquire empirical knowledge. The aim of this paper is to assess whether computer simulations actually allow for the production of empirical knowledge, and how. It provides an epistemological analysis of present-day empirical science, to which the traditional epistemological (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  24. The Unique and Practical Advantages of Applying A Capability Approach to Brain Computer Interface.Andrew Ko & Nancy S. Jecker - 2022 - Philosophy and Technology 35 (4):1-22.
    Intelligent neurotechnology is an emerging field that combines neurotechnologies like brain-computer interface (BCI) with artificial intelligence. This paper introduces a capability framework to assess the responsible use of intelligent BCI systems and provide practical ethical guidance. It proposes two tests, the threshold and flourishing tests, that BCI applications must meet, and illustrates them in a series of cases. After a brief introduction (Section 1), Section 2 sets forth the capability view and the two tests. It illustrates the threshold test using (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  25. Computational Modeling as a Philosophical Methodology.Patrick Grim - 2003 - In Luciano Floridi (ed.), The Blackwell guide to the philosophy of computing and information. Blackwell. pp. 337–349.
    Since the sixties, computational modeling has become increasingly important in both the physical and the social sciences, particularly in physics, theoretical biology, sociology, and economics. Sine the eighties, philosophers too have begun to apply computational modeling to questions in logic, epistemology, philosophy of science, philosophy of mind, philosophy of language, philosophy of biology, ethics, and social and political philosophy. This chapter analyzes a selection of interesting examples in some of those areas.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  26.  27
    Computably Compact Metric Spaces.Rodney G. Downey & Alexander G. Melnikov - 2023 - Bulletin of Symbolic Logic 29 (2):170-263.
    We give a systematic technical exposition of the foundations of the theory of computably compact metric spaces. We discover several new characterizations of computable compactness and apply these characterizations to prove new results in computable analysis and effective topology. We also apply the technique of computable compactness to give new and less combinatorially involved proofs of known results from the literature. Some of these results do not have computable compactness or compact spaces in their statements, and thus these applications are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  27.  31
    Simulation, computation and dynamics in economics.K. Vela Velupillai & Stefano Zambelli - 2015 - Journal of Economic Methodology 22 (1):1-27.
    Computation and Simulation have always played a role in economics – whether it be pure economic theory or any variant of applied, especially policy-oriented, macro- and microeconomics or what has increasingly come to be called empirical or experimental economics. Computations and simulations are also intrinsically dynamic. This triptych – computation, simulation and dynamic – is given natural foundations, mainly as a result of developments in the mathematics underpinnings in the potentials of computing, using digital technology. A running (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28.  53
    Computational Dialogic Defeasible Reasoning.Robert L. Causey - 2003 - Argumentation 17 (4):421-450.
    This article begins with an introduction to defeasible (nonmonotonic) reasoning and a brief description of a computer program, EVID, which can perform such reasoning. I then explain, and illustrate with examples, how this program can be applied in computational representations of ordinary dialogic argumentation. The program represents the beliefs and doubts of the dialoguers, and uses these propositional attitudes, which can include commonsense defeasible inference rules, to infer various changing conclusions as a dialogue progresses. It is proposed that computational (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  26
    Does computing need to go beyond good and evil impacts?Randy Connolly & Alan Fedoruk - 2015 - Journal of Information, Communication and Ethics in Society 13 (3/4):190-204.
    Purpose– This paper aims to demonstrate that computing social issues courses are often being taught by articulating the social impacts of different computer technologies and then applying moral theories to those impacts. It then argues that that approach has a number of serious drawbacks.Design/methodology/approach– A bibliometric analysis of ETHICOMP papers is carried out. Papers from early in the history of ETHICOMP are compared to recent years, so as to determine if papers are more or less focused on social scientific examinations (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  29
    Sculpting Computational‐Level Models.Mark Blokpoel - 2018 - Topics in Cognitive Science 10 (3):641-648.
    In this commentary, I advocate for strict relations between Marr's levels of analysis. Under a strict relationship, each level is exactly implemented by the subordinate level. This yields two benefits. First, it brings consistency for multilevel explanations. Second, similar to how a sculptor chisels away superfluous marble, a modeler can chisel a computational-level model by applying constraints. By sculpting the model, one restricts the set of possible algorithmic- and implementational-level theories.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  31.  28
    Uniformly computable aspects of inner functions: estimation and factorization.Timothy H. McNicholl - 2008 - Mathematical Logic Quarterly 54 (5):508-518.
    The theory of inner functions plays an important role in the study of bounded analytic functions. Inner functions are also useful in applied mathematics. Two foundational results in this theory are Frostman's Theorem and the Factorization Theorem. We prove a uniformly computable version of Frostman's Theorem. We then show that the Factorization Theorem is not uniformly computably true. We then show that for an inner function u with infinitely many zeros, the Blaschke sum of u provides the exact amount (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  45
    Archaeology Through Computational Linguistics: Inscription Statistics Predict Excavation Sites of Indus Valley Artifacts.Gabriel L. Recchia & Max M. Louwerse - 2016 - Cognitive Science 40 (8):2065-2080.
    Computational techniques comparing co-occurrences of city names in texts allow the relative longitudes and latitudes of cities to be estimated algorithmically. However, these techniques have not been applied to estimate the provenance of artifacts with unknown origins. Here, we estimate the geographic origin of artifacts from the Indus Valley Civilization, applying methods commonly used in cognitive science to the Indus script. We show that these methods can accurately predict the relative locations of archeological sites on the basis of artifacts (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33. Quantifiers in TIME and SPACE. Computational Complexity of Generalized Quantifiers in Natural Language.Jakub Szymanik - 2009 - Dissertation, University of Amsterdam
    In the dissertation we study the complexity of generalized quantifiers in natural language. Our perspective is interdisciplinary: we combine philosophical insights with theoretical computer science, experimental cognitive science and linguistic theories. -/- In Chapter 1 we argue for identifying a part of meaning, the so-called referential meaning (model-checking), with algorithms. Moreover, we discuss the influence of computational complexity theory on cognitive tasks. We give some arguments to treat as cognitively tractable only those problems which can be computed in polynomial time. (...)
    Direct download  
     
    Export citation  
     
    Bookmark   13 citations  
  34.  11
    A Computational Model of Wason's Selection Task.Emmanuel Genot - unknown
    We apply an algorithmic learning model of inquiry to model reasoning carried by experimental subjects in Wason's _Selection Task_ that represents reasoning in the task as computation of a decision tree that supervenes on semantic representations. We argue that the resulting model improves on previous probabilistic and pragmatic models of the task. In particular, it suggests that subjects' selection could in fact be guided by sophisticated patterns of argumentative reasoning.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  35.  17
    Discrete Mathematics: Applied Algebra for Computer and information Science.Leonard S. Bobrow & Michael A. Arbib - 1981 - Journal of Symbolic Logic 46 (4):878-880.
    Direct download  
     
    Export citation  
     
    Bookmark  
  36. International Workshop on Web-Based Internet Computing for Science and Engineering (ICSE 2006)-Discovery of Web Services Applied to Scientific Computations Based on QOS.Han Cao, Daxin Liu & Rui Fu - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 3842--919.
     
    Export citation  
     
    Bookmark  
  37.  15
    Intellectual computer mathematics system inparsolver.Khimich A. N., Chistyakova T. V., Sydoruk V. A. & Yershov P. S. - 2020 - Artificial Intelligence Scientific Journal 25 (4):60-71.
    The paper considers the intellectual computer mathematics system InparSolver, which is designed to automatically explore and solve basic classes of computational mathematics problems on multi-core computers with graphics accelerators. The problems of results reliability of solving problems with approximate input data are outlined. The features of the use of existing computer mathematics systems are analyzed, their weaknesses are found. The functionality of InparSolver, some innovative approaches to the implementation of effective solutions to problems in a hybrid architecture are described. Examples (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38. Computability & unsolvability.Martin Davis - 1958 - New York: Dover Publications.
    Classic text considersgeneral theory of computability, computable functions, operations on computable functions, Turing machines self-applied, unsolvable decision problems, applications of general theory, mathematical logic, Kleene hierarchy, computable functionals, classification of unsolvable decision problems and more.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   122 citations  
  39.  18
    Computational Modeling of the Segmentation of Sentence Stimuli From an Infant Word‐Finding Study.Daniel Swingley & Robin Algayres - 2024 - Cognitive Science 48 (3):e13427.
    Computational models of infant word‐finding typically operate over transcriptions of infant‐directed speech corpora. It is now possible to test models of word segmentation on speech materials, rather than transcriptions of speech. We propose that such modeling efforts be conducted over the speech of the experimental stimuli used in studies measuring infants' capacity for learning from spoken sentences. Correspondence with infant outcomes in such experiments is an appropriate benchmark for models of infants. We demonstrate such an analysis by applying the DP‐Parser (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  34
    Computable structures and the hyperarithmetical hierarchy.C. J. Ash - 2000 - New York: Elsevier. Edited by J. Knight.
    This book describes a program of research in computable structure theory. The goal is to find definability conditions corresponding to bounds on complexity which persist under isomorphism. The results apply to familiar kinds of structures (groups, fields, vector spaces, linear orderings Boolean algebras, Abelian p-groups, models of arithmetic). There are many interesting results already, but there are also many natural questions still to be answered. The book is self-contained in that it includes necessary background material from recursion theory (ordinal notations, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   46 citations  
  41.  15
    Fog computing architectures for healthcare.Lisardo Prieto González, Corvin Jaedicke, Johannes Schubert & Vladimir Stantchev - 2016 - Journal of Information, Communication and Ethics in Society 14 (4):334-349.
    Purpose The purpose of this study is to analyze how embedding of self-powered wireless sensors into cloud computing further enables such a system to become a sustainable part of work environment. Design/methodology/approach This is exemplified by an application scenario in healthcare that was developed in the context of the OpSIT project in Germany. A clearly outlined three-layer architecture, in the sense of Internet of Things, is presented. It provides the basis for integrating a broad range of sensors into smart healthcare (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  53
    Computational scientific discovery and cognitive science theories.M. Addis, Peter D. Sozou, F. Gobet & Philip R. Lane - unknown
    This study is concerned with processes for discovering new theories in science. It considers a computational approach to scientific discovery, as applied to the discovery of theories in cognitive science. The approach combines two ideas. First, a process-based scientific theory can be represented as a computer program. Second, an evolutionary computational method, genetic programming, allows computer programs to be improved through a process of computational trialand-error. Putting these two ideas together leads to a system that can automatically generate and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  43.  30
    Computational complexity for bounded distributive lattices with negation.Dmitry Shkatov & C. J. Van Alten - 2021 - Annals of Pure and Applied Logic 172 (7):102962.
    We study the computational complexity of the universal and quasi-equational theories of classes of bounded distributive lattices with a negation operation, i.e., a unary operation satisfying a subset of the properties of the Boolean negation. The upper bounds are obtained through the use of partial algebras. The lower bounds are either inherited from the equational theory of bounded distributive lattices or obtained through a reduction of a global satisfiability problem for a suitable system of propositional modal logic.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  46
    Computation and Indispensability.Jeffrey Ketland - forthcoming - Logic and Logical Philosophy:1.
    This article provides a computational example of a mathematical explanation within science, concerning computational equivalence of programs. In addition, it outlines the logical structure of the reasoning involved in explanations in applied mathematics. It concludes with a challenge that the nominalist provide a nominalistic explanation for the computational equivalence of certain programs.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  87
    Computer Simulation Validation: Fundamental Concepts, Methodological Frameworks, and Philosophical Perspectives.Claus Beisbart & Nicole J. Saam (eds.) - 2019 - Springer Verlag.
    This unique volume introduces and discusses the methods of validating computer simulations in scientific research. The core concepts, strategies, and techniques of validation are explained by an international team of pre-eminent authorities, drawing on expertise from various fields ranging from engineering and the physical sciences to the social sciences and history. The work also offers new and original philosophical perspectives on the validation of simulations. Topics and features: introduces the fundamental concepts and principles related to the validation of computer simulations, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  46.  15
    Applied Nanotechnology.Fritz Allhoff, Patrick Lin & Daniel Moore - 2009 - In Fritz Allhoff, Patrick Lin & Daniel Moore (eds.), What is Nanotechnology and Why Does It Matter: From Science to Ethics. Wiley-Blackwell. pp. 56–70.
    This chapter contains sections titled: Using Nanomaterials Nanotechnology Computing and Robotics Predicting the Future of Technology.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  47.  60
    Computing, Modelling, and Scientific Practice: Foundational Analyses and Limitations.Filippos A. Papagiannopoulos - 2018 - Dissertation, University of Western Ontario
    This dissertation examines aspects of the interplay between computing and scientific practice. The appropriate foundational framework for such an endeavour is rather real computability than the classical computability theory. This is so because physical sciences, engineering, and applied mathematics mostly employ functions defined in continuous domains. But, contrary to the case of computation over natural numbers, there is no universally accepted framework for real computation; rather, there are two incompatible approaches --computable analysis and BSS model--, both claiming (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  87
    Applied ontology: The next decade begins.Nicola Guarino & Mark Musen - 2015 - Applied ontology 10 (1):1-4.
    In 2005, IOS Press published the first issue of applied Ontology. At the time, we argued that, at the core of the journal, there was “a desire to understand the nature of reality and how people construe their world”. We declared that ontology was both “fundamental to human thought” and “to translating our thoughts into computational artifacts” (Guarino & Musen,2005). With an editorial board of distinguished scholars representing the fields of computer science, informatics, information science, philosophy, linguistics, psychology, and (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  49. The computational account of belief.Lawrence J. Kaye - 1994 - Erkenntnis 40 (2):137-53.
    Fodor and others who think that scientific, computational psychology will vindicate commonsense belief-desire psychology have maintained that belief can be identified with the explicit storage of a token with appropriate content. I review and develop problems for the explicit storage view and show that a more plausible account identifies belief with the disposition to use a token with appropriate content in explicit reasoning and planning processes and as a basis for action. I argue that this type of inner disposition account (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  50. Disclosive computer ethics.Philip Brey - 2000 - Acm Sigcas Computers and Society 30 (4):10-16.
    This essay provides a critique of mainstream computer ethics and argues for the importance of a complementary approach called disclosive computer ethics, which is concerned with the moral deciphering of embedded values and norms in computer systems, applications and practices. Also, four key values are proposed as starting points for disclosive studies in computer ethics: justice, autonomy, democracy and privacy. Finally, it is argued that research in disclosive computer ethics should be multi-level and interdisciplinary, distinguishing between a disclosure level, a (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   44 citations  
1 — 50 / 975