Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Architecture Arts and Humanities Business Education Engineering Law Life Sciences Medicine and Health Sciences Physical Sciences and Mathematics Social and Behavioral Sciences (65)
- Contextural Programming Paradigm (5)
- Works by David Morgan Lochhead (5)
- Memristics, Memristors, Computation (4)
- Polycontexturality - Second-Order Cybernetics (4)
-
- David Lochhead Symposium - VST Vancouver, October 2006 (3)
- Formal Systems in Polycontextural Constellations (3)
- Interactivity (3)
- Memristics (3)
- Morphogrammatics (3)
- Philosophy of Mind (3)
- Polycontexturality (3)
- Axiomatics (2)
- Category theory (2)
- Chiasm (2)
- China (2)
- Diamond (2)
- Diamond Strategies (2)
- Empirism (2)
- Legal Implications of Emerging Technologies (2)
- Legal Protection by Design (2)
- Memristor (2)
- Mixed Reality Environment for Web-Based Laboratory Interactive Learning (2)
- Paul Feyerabend Facsimiles (2)
- Philosophy of mind (2)
- Privacy (2)
- Social Cognition (2)
- morphic bisimilarity. (1)
- -The effect of Perceived risk on the process of online buying electrical products by Jordanian consumers in Amman, Journal of BENI SUEIF University, 2007 (1)
- 5x20 Matrix for Knowledge Management Lifecycle Based on the Five Cs Model and a Critical Review (1)
- Publication Year
- Publication
Articles 1 - 30 of 122
Full-Text Articles in Arts and Humanities
Ramping Down Chinese Commercial Cyber Espionage, Emilio Iasiello
Ramping Down Chinese Commercial Cyber Espionage, Emilio Iasiello
Emilio Iasiello
While detractors believe that commercial cyber espionage hasn’t really stopped, recent Chinese efforts show a government trying to get a handle on its large spying apparatus that could include hired and independent contractors acting autonomously in addition to its other resources. While complete cessation may never occur, significant timely reduction demonstrates Beijing’s willingness to work with the United States as a partner and not a pariah, and provides a foundation from which the two governments can move forward on other cyber security areas where incongruity persists.
Of Mills And Machines - Computing Thought Experiments On Consciousness, Aïda Raoult
Of Mills And Machines - Computing Thought Experiments On Consciousness, Aïda Raoult
Aïda Raoult
In this computing-oriented analysis, 5 of the most influential thought experiments on consciousness inspired by the development of A.I. in the 70s-80s are (1) presented as more refined versions of Leibniz’s mill (LM), (2) then reformulated in terms of LM which reveals a divergence in their approach of the mind-body problem; (3) combining this result with computational complexity theory shows the ontological question is less difficult to answer than the causal one. In the end, (4) these considerations participate in the debate over machine consciousness.
Leveraging Library Technknowledgie - Library Expertise Front And Center In The Digitial Humanities: An Omeka.Net Case Study, M Ryan Hess, Rebecca Cooling
Leveraging Library Technknowledgie - Library Expertise Front And Center In The Digitial Humanities: An Omeka.Net Case Study, M Ryan Hess, Rebecca Cooling
M Ryan Hess
Providing technical know-how to non-technical researchers to promote and preserve their collections online is an emerging niche librarians are filling. Digital humanities partners are sometimes external to the library’s institution. DePaul University Library assisted researchers at the National University of Ireland, Galway in preserving their catalogue of Vincentian documents by migrating metadata from an unstable server to Omeka.net, a hosted web publishing platform designed for cultural institutions. The library proposed Omeka.net after considering the collection’s requirements, the technical abilities of the researchers and their budget. The library contributed their expertise of metadata by analyzing, re-encoding, and cross-walking metadata to Dublin …
Balance Or Trade-Off? Online Security Technologies And Fundamental Rights, Mireille Hildebrandt
Balance Or Trade-Off? Online Security Technologies And Fundamental Rights, Mireille Hildebrandt
Mireille Hildebrandt
In this contribution I argue that the image of the balance is often used to defend the idea of a trade-off. To understand the drawbacks of this line of thought I will explore the relationship between online security technologies and fundamental rights, notably privacy, non-discrimination, freedom of speech and due process. After discriminating between three types of online security technologies I will trace the reconfiguration of the notion of privacy in the era of smart environments. This will lead to an inquiry into the metaphor of the scale, building on the triple test regarding the justification of the limitation of …
Introduction To The Value Of Personal Data, Mireille Hildebrandt, Kieron O'Hara, Michael Waidner
Introduction To The Value Of Personal Data, Mireille Hildebrandt, Kieron O'Hara, Michael Waidner
Mireille Hildebrandt
This Chapter provides an introduction to and overview of the 2013 Yearbook of the Digital Enlightenment Forum, on the subject of the value of personal data. It discusses why we should care about the current monetization of our personal data and raises the issue of whether and, if so, how user-centric personal data ecosystems help to rebalance power asymmetries between individual citizens and large Personal Data Processing Systems.
The Issue Of Internet Polling, Nick Nichols
The Issue Of Internet Polling, Nick Nichols
The Intellectual Standard
No abstract provided.
5x20 Matrix For Knowledge Management Lifecycle Based On The Five C’S Model And A Critical Review, Philadelphia University
5x20 Matrix For Knowledge Management Lifecycle Based On The Five C’S Model And A Critical Review, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
The Short Story In Jordan Its Origin And Development, Philadelphia University
The Short Story In Jordan Its Origin And Development, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Measuring Intellectual Capital In Corporations, Philadelphia University
Measuring Intellectual Capital In Corporations, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Mixed Reality Environment For Web-Based Laboratory Interactive Learning, Philadelphia University
Mixed Reality Environment For Web-Based Laboratory Interactive Learning, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Modeling An Interactive Fms Scheduler Using Colored Petri Nets, Philadelphia University
Modeling An Interactive Fms Scheduler Using Colored Petri Nets, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Studies On Taxonomy And Ecology Of Some Fish Larve From The Gulf Of Aqaba, Philadelphia University
Studies On Taxonomy And Ecology Of Some Fish Larve From The Gulf Of Aqaba, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
تلخيص ونبذة عن كتاب الجراحة التجميلية في الجوانب القانونية والشرعية, Philadelphia University
تلخيص ونبذة عن كتاب الجراحة التجميلية في الجوانب القانونية والشرعية, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Quality Evaluation Of Reconstructed Biological Signals, American Journal Of Applied Sciences, 6 (1): 187-193, 2009., Philadelphia University
Quality Evaluation Of Reconstructed Biological Signals, American Journal Of Applied Sciences, 6 (1): 187-193, 2009., Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Guidelines For Teaching These Speech Acts, Philadelphia University
Guidelines For Teaching These Speech Acts, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Exploration And Impacts Of Utilizing Computerized Information Systems Field Study: At The Headquarters Of Jordanian Ministry Of Education, Philadelphia University
Exploration And Impacts Of Utilizing Computerized Information Systems Field Study: At The Headquarters Of Jordanian Ministry Of Education, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Spatial Organization Of The International Tourism Flows In Jordan, Philadelphia University
Spatial Organization Of The International Tourism Flows In Jordan, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Morphogrammatics Of Reflection, Rudolf Kaehr
Morphogrammatics Of Reflection, Rudolf Kaehr
Rudolf Kaehr
Turning back from the studies of morphogrammatics to some open questions of reflectional programming, the recountered problematics might be put into a different light and new methods of handling formal aspects of reflection and reflectionality shall be introduced. Albeit the use of light-metaphors, morphogrammatic reflection is not sketched along the paradigm of optical metaphors. Morphograms are presenting neither propositions nor perceptions able for mirroring (representation). Exercises in defining morphogrammatic retro-grade recursion and reflection schemata are continued from the paper “Sketches to Morphogrammatic Programming”.
Emergent Design Dissertation Errata, Kent D. Palmer
Emergent Design Dissertation Errata, Kent D. Palmer
Kent D. Palmer
Errors found in final dissertation
Memristics: Memristors, Again? – Part Ii, How To Transform Wired ‘Translations’ Between Crossbars Into Interactions?, Rudolf Kaehr
Memristics: Memristors, Again? – Part Ii, How To Transform Wired ‘Translations’ Between Crossbars Into Interactions?, Rudolf Kaehr
Rudolf Kaehr
The idea behind this patchwork of conceptual interventions is to show the possibility of a “buffer-free” modeling of the crossbar architecture for memristive systems on the base of a purely difference-theoretical approach. It is considered that on a nano-electronic level principles of interpretation appears as mechanisms of complementarity. The most basic conceptual approach to such a complementarity is introduced as an interchangeability of operators and operands of an operation. Therefore, the architecture of crossbars gets an interpretation as complementarity between crossbar functionality and “buffering” translation functionality. That is, the same matter functions as operator and at once, as operand – …
Memristics: Memristors, Again?, Rudolf Kaehr
Memristics: Memristors, Again?, Rudolf Kaehr
Rudolf Kaehr
This collection gives first and short critical reflections on the concepts of memristics, memristors and memristive systems and the history of similar movements with an own focus on a possible interplay between memory and computing functions, at once, at the same place and time, to achieve a new kind of complementarity between computation and memory on a single chip without retarding buffering conditions.
Sketch Of A Typology Of Abstract Memristic Machines, Rudolf Kaehr
Sketch Of A Typology Of Abstract Memristic Machines, Rudolf Kaehr
Rudolf Kaehr
A typology of memristic machines is sketched. This sketch gives an overview and orientation to the paper “Towards Abstract Memristic Machines”. It also intents to propose a concise systematization of the newly introduced terms and strategies to memristics and morphogrammatics. This sketch is introducing four types of sign-use for four types of machines of fundamentally different paradigms: 1. semiotic, 2. monomorphic, 3. polymorphic and 4. bisimilar abstract machines. Further definitions of abstract machines have to be based on those graphematic notational systems. A realization of such constructions of abstract machines, in contrast to existing abstract machines of the theory of …
Towards Abstract Memristic Machines, Rudolf Kaehr
From Universe To Polyverses, Rudolf Kaehr
From Universe To Polyverses, Rudolf Kaehr
Rudolf Kaehr
Some thoughts about the power of speculation behind important discoveries in mathematics, physics and computer science. The exercise shows that there is no need for a compulsory ultimate unifying universe. It is speculated that just this paradigm of a single ultimate universe is unmasking itself today as the main obstacle for further development in Western science and technology.
Morphogrammatics For Dummies: The Domino Approach, Rudolf Kaehr
Morphogrammatics For Dummies: The Domino Approach, Rudolf Kaehr
Rudolf Kaehr
Dominoes, morphograms, cellular automata, memristics. Topics: possible continuation, coalitions, cooperations, substitution, morphic bisimilarity.
An Investigation Of Speech Enhancement Using Wavelet Filtering Method, International Journal Of Speech Technology, Philadelphia University
An Investigation Of Speech Enhancement Using Wavelet Filtering Method, International Journal Of Speech Technology, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Jordanian Commercial Bank Strategies In High- Rate Of Return Realization And Its Relation With Liquidity Gap Management Performance, Philadelphia University
Jordanian Commercial Bank Strategies In High- Rate Of Return Realization And Its Relation With Liquidity Gap Management Performance, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Testing Lyoequivalency For Three Commercially Sustainedrelease Tablets Containing Diltiazem Hydrochloride, Philadelphia University
Testing Lyoequivalency For Three Commercially Sustainedrelease Tablets Containing Diltiazem Hydrochloride, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
The Novel And The Experimentation, Philadelphia University
The Novel And The Experimentation, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Neural-Network-Based Fuzzy Identifier: Design And Evaluation, Philadelphia University
Neural-Network-Based Fuzzy Identifier: Design And Evaluation, Philadelphia University
Philadelphia University, Jordan
No abstract provided.