A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
People's Opinion, People's Nexus, People's Security and Computational Intelligence: The Evolution Continues
[chapter]
2011
Lecture Notes in Computer Science
The second part of the talk will be devoted to the challenges that the Computational Intelligence communities are faced with in order to address issues related to people's nexus, opinion, and security ...
At the end, I will provide an overview of our current research focus on network security and intelligence information handling and disimination. B. Hu et al. ...
doi:10.1007/978-3-642-23605-1_3
fatcat:ykzwzvuj4nfefnj7g3md4xgbgq
People's Opinion, People's Nexus, People's Security and Computational Intelligence: The Evolution Continues
[chapter]
2011
Lecture Notes in Computer Science
The second part of the talk will be devoted to the challenges that the Computational Intelligence communities are faced with in order to address issues related to people's nexus, opinion, and security ...
At the end, I will provide an overview of our current research focus on network security and intelligence information handling and disimination. ...
doi:10.1007/978-3-642-23620-4_1
fatcat:l7xkmpja7jf23doozsxn2dggli
Across the Great Wall
[chapter]
2021
Artificial Intelligence and International Economic Law
So long as the Chinese regulators can continue to conduct content view and block foreign websites on security grounds, where the data is stored would be much less important. ...
services and e-government affairs", as well as those "that will result in serious damage to state security, the national economy and the people's livelihood and public interest if it is destroyed, loses ...
While the chapter on e-commerce is not subject to the normal dispute settlement procedure under the RCEP, the importance China attaches to the RCEP and the peer pressure under the consultation and Joint ...
doi:10.1017/9781108954006.016
fatcat:dluvlu346ba75mi2msuborgajm
Social interactions in Ambient Intelligent environments
2011
Journal of Ambient Intelligence and Smart Environments
Research hypothesis While the work in this thesis is addressing the more general hypothesis that technology can support social affiliation, some more specific research hypothesis are defined and addressed ...
The test facility within Philips Research that conforms to the EARC principle is the ExperienceLab 5 that is: test participants not in the same physical environment ...
So the socially intelligent person has a better than average ability to judge other people's feelings, thoughts, attitudes and opinions, intentions, or the psychological traits that may determine their ...
doi:10.3233/ais-2011-0104
fatcat:hgogtr4xqzbefcp5vgstarauoi
Computational Power and the Social Impact of Artificial Intelligence
[article]
2018
arXiv
pre-print
To that end, it is inextricably tied to computational power - the tangible material of chips and semiconductors that the algorithms of machine intelligence operate on. ...
Most obviously, computational power and computing architectures shape the speed of training and inference in machine learning, and therefore influence the rate of progress in the technology. ...
Computational power is intimately linked to a nexus of issues in civil rights, consumer safety, geopolitical competition, labor policy, and corporate power. ...
arXiv:1803.08971v1
fatcat:pk2axnmpvnbzfbcdcxg7a7bqne
The Nexus Between Artificial Intelligence and Economics
[chapter]
2013
SpringerBriefs in Economics
This contrasts with the traditional view that Artificial Intelligence is a computational process, encompassing only disembodied tasks, such as abstract problem solving and reasoning, knowledge representation ...
This would allow the creation of a human-like artificial intelligence and the achievement of cybernetic immortality for humans. ...
Continuing progress in the development of faster, more capable computers would cause the computer to equal and then to surpass humans in intelligence. ...
doi:10.1007/978-3-642-33648-5_1
fatcat:6uclihbcqrfajkhwpapp5wgkou
Rebuilding Trust: Queer in AI Approach to Artificial Intelligence Risk Management
[article]
2022
arXiv
pre-print
Trustworthy artificial intelligence (AI) has become an important topic because trust in AI systems and their creators has been lost. ...
We argue that any AI development, deployment, and monitoring framework that aspires to trust must incorporate both feminist, non-exploitative participatory design principles and strong, outside, and continual ...
, and continual monitoring and testing. ...
arXiv:2110.09271v3
fatcat:wejzcorzqndkldo73aqldijobq
Data Regulation with Chinese Characteristics
[chapter]
2021
Big Data and Global Trade Law
The state monitors and regulates the data used by the first two groups, which involves the collection, processing, access and transfer of data. ...
As both the raw data and the processed data are controlled by the companies, consumers, at least to the extent they would act in their best interest, wish to ensure that their privacy and personal data ...
the rise of big data and artificial intelligence. ...
doi:10.1017/9781108919234.017
fatcat:cdi56vplzzbfdd2fhkfqu26drq
Cyber China: Upgrading Propaganda, Public Opinion Work and Social Management for the Twenty-First Century
2016
Journal of Contemporary China
, public opinion and social control work. ...
This article reviews the institutional and regulatory changes that have taken place between 2012 and 2014, and analyses the methods and purposes of control they imply. ...
Notes on contributor Rogier Creemers is a Post-Doctoral Scholar in the Law and Governance of China at the University of Leiden Van Vollenhoven Institute and the Leiden Institute for Area Studies. ...
doi:10.1080/10670564.2016.1206281
fatcat:x4mttwe52fa6lismxd2xfedrwu
Data Regulation with Chinese Characteristics
2019
Social Science Research Network
with the rise of big data and artificial intelligence. ...
of computer information networks within China, which is defined as "networking of the computer information networks inside the People's Republic of China and those in foreign countries with the purpose ...
doi:10.2139/ssrn.3430284
fatcat:umly7vjcazgsbcnvjdwrqyo7ui
A 20-Year Community Roadmap for Artificial Intelligence Research in the US
[article]
2019
arXiv
pre-print
, and secure. ...
These are the major recommendations of a recent community effort coordinated by the Computing Community Consortium and the Association for the Advancement of Artificial Intelligence to formulate a Roadmap ...
This kind of multidisciplinary effort is naturally and best located at the nexus of the social sciences, humanities, and computing and within university environments. ...
arXiv:1908.02624v1
fatcat:jza6i2tzufgeracsou77qukbu4
How the Utilization of Integrated Industry 4.0 Technologies will Radically Address Medical Data Integrity Concerns in Singapore
2022
International Journal of Artificial Intelligence and Machine Learning
This research focuses on the Singapore medical industry and on the opinions of Singaporeans and the predictions of industry experts. ...
This study will explore how the utilization of Blockchain can help to address medical data security concerns to accelerate the utilization of digital health and Telemedicine, which is one of the key concerns ...
This research aims to offer a novel insight into the adoption of the integration of Blockchain, Artificial Intelligence, Telemedicine, digital health, and the IoMT by the Singapore medical industry and ...
doi:10.51483/ijaiml.2.1.2022.75-117
fatcat:2iubqdscpjcl3pmnpfmd4grbmm
OSTP-AWhite House Office of Science and Technology Policy Request for Information on the Future of Artificial Intelligence
2017
Figshare
White House Office of Science and Technology Policy Request for Information on the Future of Artificial Intelligence ...
, robust induction, security in learning source provenance, user modeling, and values modeling. ...
identification, anomaly explanation, computational humility or non-self-centered world models, computational respect or safe exploration, computational sympathy, concept geometry, corrigibility or scalable ...
doi:10.6084/m9.figshare.4640305
fatcat:26aelpe4ejbupao5yh2mys2pzq
The Role of Social Movements, Coalitions, and Workers in Resisting Harmful Artificial Intelligence and Contributing to the Development of Responsible AI
[article]
2021
arXiv
pre-print
From indigenous people addressing the lack of reliable data, to smart city stakeholders, to students protesting the academic relationships with sex trafficker and MIT donor Jeffery Epstein, the questionable ...
ethics and values of those heavily investing in and profiting from AI are under global scrutiny. ...
will continue, fueled by growing deployment of artificial intelligence tools to manipulate the preconditions and levers of democracy. ...
arXiv:2107.14052v1
fatcat:etqo64ksjzaihmt4kr7b6auxiu
A panoramic view and swot analysis of artificial intelligence for achieving the sustainable development goals by 2030: progress and prospects
2021
Applied intelligence (Boston)
This study aims at providing a snapshot and comprehensive view of the progress made and prospects in the relationship between artificial intelligence technologies and the SDGs. ...
Artificial intelligence and other digital technologies that have emerged in the last years, are being currently applied in virtually every area of society, economy and the environment. ...
Acknowledgment This work was supported by the contract OTRI-4408 between the University of Granada and the Royal Academy of Engineering of Spain financed by Ferrovial S.A. ...
doi:10.1007/s10489-021-02264-y
pmid:34764606
pmcid:PMC8192224
fatcat:pszxzjypgzg77lswhv3sj2czfe
« Previous
Showing results 1 — 15 out of 2,751 results