Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

Should Robots Prosecute And Defend?, Stephen E. Henderson Dec 2018

Should Robots Prosecute And Defend?, Stephen E. Henderson

Stephen E Henderson

Even when we achieve the ‘holy grail’ of artificial intelligence—machine intelligence that is at least as smart as a human being in every area of thought—there may be classes of decisions for which it is intrinsically important to retain a human in the loop. On the common account of American criminal adjudication, the role of prosecutor seems to include such decisions given the largely unreviewable declination authority, whereas the role of defense counsel would seem fully susceptible of automation. And even for the prosecutor, the benefits of automation might outweigh the intrinsic decision-making loss, given that the ultimate decision—by judge …


The Digital Dionysus: Nietzsche & The Network-Centric Condition Dec 2015

The Digital Dionysus: Nietzsche & The Network-Centric Condition

Dan Mellamphy

No abstract provided.


A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson Dec 2014

A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson

Maurice Dawson

Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the …


The Legal Challenges Of Networked Robotics: From The Safety Intelligence Perspective, Yueh-Hsuan Weng, Sophie T.H. Zhao Nov 2012

The Legal Challenges Of Networked Robotics: From The Safety Intelligence Perspective, Yueh-Hsuan Weng, Sophie T.H. Zhao

Yueh-Hsuan Weng

One of the reasons that future robots will enhance their intelligence and actions in an unstructured environment is because of their “networked” feature. Current robot designs have difficulty in understanding unstructured environments due to the inherent diversity and unpredictability of phenomena in the real world. However, new developments such as ubiquitous computing, cloud computing, the Internet of things and next-generation internet technologies will make it easier for networked robots to obtain structured information about their physical environment. The formation of cloud-enabled robotics by advanced technology will be tightly integrated into the virtual and real world, and this will strengthen the …


Technology Management Trends In Law Schools, Carol A. Watson, Larry Reeves Nov 2011

Technology Management Trends In Law Schools, Carol A. Watson, Larry Reeves

Carol A. Watson

Discusses the role of librarians in law school technology management and analyzes technology staffing survey results for 2002, 2006, and 2010. While survey results indicate a trend toward establishing separate information technology departments within law schools, librarians are and will continue to be actively involved in law school technology.


Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham Jul 2008

Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham

George H Baker

The physical and social fabric of the United States is sustained by a system of systems; a complex and dynamic network of interlocking and interdependent infrastructures (“critical national infrastructures”) whose harmonious functioning enables the myriad actions, transactions, and information flow that undergird the orderly conduct of civil society in this country. The vulnerability of these frastructures to threats — deliberate, accidental, and acts of nature — is the focus of greatly heightened concern in the current era, a process accelerated by the events of 9/11 and recent hurricanes, including Katrina and Rita. This report presents the results of the Commission’s …