4,188 Hits in 5.1 sec

Intelligence and Cognitive Control [chapter]

Adam Chuderski, Edward Nęcka
2010 Handbook of Individual Differences in Cognition  
Intelligence, personality, and interests: evidence for overlapping traits. References Psychological Bulletin, 121, 219-245. Baker, T.  ...  Recent attempts to provide more comprehensive measurement models for WM functions come from studies using latent variable analysis (see Orzechowski, this volume, for detailed and critical review).  ...  In Ackerman and Heggestad's meta-analysis, the relationship resulted in 0.08 for general intelligence.  ... 
doi:10.1007/978-1-4419-1210-7_16 fatcat:itedvhvceratlgg74gnnweasbm

Building Human-like Communicative Intelligence: A Grounded Perspective

Marina Dubova
2021 Cognitive Systems Research  
I then use this analysis to propose a list of concrete, implementable components for building "grounded" linguistic intelligence.  ...  Modern Artificial Intelligence (AI) systems excel at diverse tasks, from image classification to strategy games, even outperforming humans in many of these domains.  ...  ACKNOWLEDGEMENTS I would like to thank Justin Wood and Robert Goldstone for their extremely helpful feedback at every stage of the preparation of this manuscript.  ... 
doi:10.1016/j.cogsys.2021.12.002 fatcat:c2dwpl43dba2dduhmbm4fg2ayy

The Ontogenetic Intelligence of Nature

Peter Belohlavek
2015 Social Science Research Network  
This deviation evaluation calls for a double analysis.  ...  Anti-intelligence is the functional intelligence for destruction.  ... 
doi:10.2139/ssrn.2599540 fatcat:wibvua2cuzaalh2eq6lm3adima

Knowledge and social networks: New dimensions of economic interaction between firms

Michael Steiner, Michael Ploder
2011 Journal of Intelligence Studies in Business  
The paper explores the form and content of economic interaction of firms based on various concepts of agglomeration and social networks.  ...  These relationships are interpreted in terms of their need for proximity, their durability and above all their direction of knowledge dependency.  ...  The cross-sectoral dimension of knowledge spillovers is also a source of contention in the literature. Following Marshall (1890) and Arrow (1962) knowledge is predominantly industryspecific.  ... 
doi:10.37380/jisib.v1i1.14 fatcat:xwcpwdz7wjgyfohmohqlzvr5e4

Intelligence and anticipation: issues in security, risk and crisis management

Paul Barnes, Michael B. Charles, Mark Branagan, Alistair Knight
2007 International Journal of Risk Assessment and Management  
Vulnerability Analysis 2. What threat(s) could affect vulnerabilities 3. How could threats be recognized (evidence)? 4.  ...  Marshall, the Army's chief of staff, of the threat posed by the Zero in late 1940.  ... 
doi:10.1504/ijram.2007.015302 fatcat:liuvgbiuzrcybpuupdlfcsehte

4.5.4 Dialogic design for the intelligent enterprise: Collaborative strategy, process, and action

Peter H. Jones, Alexander N. Christakis, Thomas R. Flanagan
2007 INCOSE International Symposium  
Dialogic design provides efficient, reliable approaches for organizations to envision and implement cohesive, comprehensive, and compelling roadmaps for enterprise evolution.  ...  Using structured dialogue to integrate the collective intelligence of stakeholders, we produce a shared representation of the intelligent enterprise, enabling "organizing around intellect."  ...  The key distinction between the uses of SDD in these two distinct applications rests with the "trigger question" that aims the process either internally (for ontological analysis) or externally (for strategic  ... 
doi:10.1002/j.2334-5837.2007.tb02906.x fatcat:cck77nazrzhk7kdxtaw4xd4vna

See No…, Hear No…, Track No…: Ethics and the Intelligent Campus

Andrew Nicholas Cormack
2019 Journal of Information Rights Policy and Practice  
, audio analysis for trigger words, or mapping of behaviour or relationships between individuals.  ...  Mara Ballestrini, Paul Marshall, Tomas Diez, 'Beyond Boundaries: the home as city infrastructure for smart citizens' (2014) UbiComp Adjunct, 988 <> accessed 14  ... 
doi:10.21039/irpandp.v3i1.59 fatcat:7tqnermghnhehk2afg7y2qhiz4

Origins of the Royal Commission on Intelligence and Security

CJ Coventry
2018 Zenodo  
This was despite experiencing two decades of ASIO's ideological partisanship, which had consequences for Labor.  ...  But the party's decision was not inconsistent with its history, having been an anti-communist party from the 1920s and responsible for ASIO's creation in 1949.  ...  However, Labor was proactive in its anticommunism.  ... 
doi:10.5281/zenodo.1495813 fatcat:xusg2dkn4bb45jl7wgpkho4hoi

Modeling naturalistic argumentation in research literatures: Representation and interaction design issues

Simon J. Buckingham Shum, Victoria Uren, Gangmin Li, Bertrand Sereno, Clara Mancini
2006 International Journal of Intelligent Systems  
analysis.  ...  discussing passive and intelligent user interfaces designed to support analysts in the construction, navigation and analysis of scholarly argument structures in a Web-based environment.  ...  We are also indebted to Robert Horn for providing digital copies of his Turing debate argumentation posters.  ... 
doi:10.1002/int.20188 fatcat:ih7kqsrqd5h6nfbqng7vldrz2y

Research interests: their dynamics, structures and applications in unifying search and reasoning

Yi Zeng, Erzhong Zhou, Yan Wang, Xu Ren, Yulin Qin, Zhisheng Huang, Ning Zhong
2010 Journal of Intelligent Information Systems  
The author would like to thank Yiyu Yao for his constructive discussion on user interests based knowledge retrieval, Rui Guo and Chao Gao on their useful comments on network theory which are used for interpreting  ...  the phenomenon observed in this study, Jian Yang for his suggestions on measurement of research interests.  ...  * Web Data Mining for Predictive Intelligence. * Content Analysis for Proactive Intelligence: Marshaling Frame Evidence. * Efficient XML-to-SQL Query Translation: Where to Add the Intelligence?  ... 
doi:10.1007/s10844-010-0144-1 fatcat:aj4zkqjv4zgqtkbfl2ksto6wj4

Cyber Security Solutions for Businesses in Financial Services

Shahzeb Akhtar, Pratima Amol Sheorey, Sonali Bhattacharya, Ajith Kumar V. V.
2021 International Journal of Business Intelligence Research  
This paper attempts a comprehensive review for all sizes of businesses.  ...  This paper presents an in-depth analysis regarding security technologies and their efficacy to protect data assets and sensitive information.  ...  Intelligence analysis is something that needs to be kept in the core of all techniques used.  ... 
doi:10.4018/ijbir.20210101.oa5 fatcat:wytjze4sfjf6dceja4mcxxyzki

Alternative Water Supply Systems

Fayyaz Ali Memon
2014 Water Intelligence Online  
Chapter 3 The verifi cation of a behavioural model for simulating the hydraulic performance of rainwater harvesting systems . . .  ...  ACKNOWLEDGEMENTS The authors would like to thank Rachel Smith (IRRI-Mexico) for her help in collecting valuable site data, as well as CONACYT (Mexican Council of Science ACKNOWLEDGEMENTS The authors  ...  McCreanor (Mercer University), Mischa Morgera (USF), Gary Osborne (The Florida Aquarium, Tampa) and Kyle Tejashri (University of Texas, Austin) for providing access to technical information on the case  ... 
doi:10.2166/9781780405513 fatcat:rzboaopngjcwbookdbwyvsdsbq

Technosocial predictive analytics for security informatics

Antonio Sanfilippo, Nigel Gilbert, Mark Greaves
2012 Security Informatics  
Integrating data harvesting, natural language processing, data mining and content analysis technologies to support the modeling task with inputs of expertise and evidence, and 3.  ...  Michael Madison et al. describe a novel evidence marshaling solution that significantly advances the state of the art.  ... 
doi:10.1186/2190-8532-1-8 fatcat:suittmhr4zdotdq6i6w7cffiti

The Role of Social Movements, Coalitions, and Workers in Resisting Harmful Artificial Intelligence and Contributing to the Development of Responsible AI [article]

Susan von Struensee
2021 arXiv   pre-print
FAT/ML Principles for Accountable Algorithms and a Social Impact Statement for Algorithms International | civil society Recommendation Fraunhofer Institute for Intelligent Analysis and Information Systems  ...  For current resources and analysis, visit 512 513 Id.  ...  APPENDICES The legal and regulatory landscape for AI and ML systems is changing rapidly.  ... 
arXiv:2107.14052v1 fatcat:etqo64ksjzaihmt4kr7b6auxiu

Coastal Lagoons in Europe: Integrated Water Resource Strategies

Ana I. Lillebø
2015 Water Intelligence Online  
, under the 7th Framework Programme, through the collaborative research project LAGOONS (contract n° 283157); by European funds through COMPETE and by Portuguese funds through the national Foundation for  ...  Such an analysis enabled a proactive approach rather than a reactive one, and the so-called SWOT analysis (Strengths, Weaknesses, Opportunities, Threats) allowed us to do so in a rational and concise manner  ...  to this are already evident.  ... 
doi:10.2166/9781780406299 fatcat:d7e7ebaimvdqfffqxbj3oxmmrq
« Previous Showing results 1 — 15 out of 4,188 results