A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Perspectives on Platform Regulation: Concepts and Models of Social Media Governance Across the Globe
2021
Recht und Digitalisierung | Digitization and the Law
The book offers legislative solutions from various parts of the world, compares regulatory concepts and assesses the use of algorithms. ...
Online social media platforms set the agenda and structure for public and private communication in our age. Their influence and power is beyond any traditional media empire. ...
The papers have been presented in the workshop series 'Hate speech and Platform Regulation' organised in cooperation of these universities, and hosted by the Institute for Telecommunication and Media Law ...
doi:10.17176/20220609-172501-0
fatcat:ajsh6gcxmnhsferyyslen2jqwi
Rating Computer Science via Chess
[chapter]
2019
Lecture Notes in Computer Science
To gear up for limited human challenge opportunities, designers of chess machines needed to forecast their skill on the human rating scale. ...
Computer chess was originally purposed for insight into the human mind. It became a quest to get the most power out of computer hardware and software. ...
The last point bears comparison with Moore's Law and arguments over its slowing or cessation. ...
doi:10.1007/978-3-319-91908-9_12
fatcat:u35ssxfisra2lkjwvcni6cioue
Trends in Algorithms for Nonuniform Applications on Hierarchical Distributed Architectures
[chapter]
2000
Computational Aerosciences in the 21st Century
to be conscious of and adapt to the distributed and hierarchical aspects of memory architecture. ...
For this purpose, pseudo-transient Newton-Krylov-Schwarz methods are briefly introduced and their parallel scalability in bulk synchronous SPMD applications is explored. We also indicate some funda- ...
He is grateful to Manny Salas and Kyle Anderson, organizers of the "Computational Aerosciences for the 21st Century" workshop for the unnatural impetus to contemplate a computational world 10-20 years ...
doi:10.1007/978-94-010-0948-5_6
fatcat:7y2rsfl5frdwhemru5agrzj4ge
Mimicking Anti-Viruses with Machine Learning and Entropy Profiles
2019
Entropy
Our results, applied to 57 different anti-virus engines, show that we can mimic their behaviour with an accuracy close to 98% in the best case and 75% in the worst, applied on Windows' disk resident malware ...
In this work, we show how this is indeed possible by combining entropy patterns with classification algorithms. ...
We gratefully acknowledge the support of NVIDIA Corporation with the donation of the Titan V GPU used for this research.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/e21050513
pmid:33267227
fatcat:adxa4om3nngu5jm3cvhjlajvja
How Blue is the Sky?
2021
eNeuro
The recent trend toward an industrialization of brain exploration and the technological prowess of artificial intelligence algorithms and high-performance computing has caught the imagination of the public ...
Will "it" (the digital avatar) be conscious? The Blue Brain Project (BBP) and the European flagship the Human Brain Project (HBP) have surfed on this wave for the past 10 years. ...
In parallel, it is likely that computing with Von Neumann architecture will adapt at a faster pace to the increase of electronic components performance, miniaturization and parallelism, predicted by Moore's ...
doi:10.1523/eneuro.0130-21.2021
pmid:33931493
pmcid:PMC8174045
fatcat:zymm2adkx5df7kwosz6q6fu2eq
Programming backgammon using self-teaching neural nets
2002
Artificial Intelligence
Particular emphasis is placed on programming shallow-depth search algorithms, and on TD-Gammon's doubling algorithm, which is described in print here for the first time. ...
TD-Gammon is a neural network that is able to teach itself to play backgammon solely by playing against itself and learning from the results. ...
Acknowledgement The author thanks Olivier Egger for providing a beta version of Snowie 3.2 used to perform the rollout analysis. ...
doi:10.1016/s0004-3702(01)00110-2
fatcat:rppbcwre45bhngtujmdwt4264a
INFRARED TECHNOLOGY THE HISTORY, TRENDS, AND FUTURE OF TurboPK
unpublished
This breakthrough capability is the result of Moore's law in microelectronics. ...
Finally, advances in IR technology have been, and will continue to be, largely driven by advances in materials and in microelectronics. The latter area is advancing exponentially by Moore's Law. ...
fatcat:mgxfa2mdu5fj5nqmk2felsam4a
Density-gradient theory: a macroscopic approach to quantum confinement and tunneling in semiconductor devices
2011
Journal of Computational Electronics
Remarks are also given about the underlying mathematics and numerics. A variety of applications of the theory to both quantum confinement and quantum tunneling situations are then reviewed. ...
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining ...
Andrew Brown of the University of Glasgow for generously allowing the use of Figs. 3.5.5-3.5.7 from [42] , and to Dr. Chagaan Baatar and the Office of Naval Research for funding support. ...
doi:10.1007/s10825-011-0356-9
fatcat:ksi6tr7xtvgh7j3q3mkjdwdnfu
Digitextual Modernism: Digital Remediation of Modernist Poetry
[article]
2022
Using the poetry of three authors of relatively disparate styles – Marianne Moore's "An Octopus" and "The Fish," T. S. Eliot's The Waste Land, and W. B. ...
Particular attention is given to "distracted" reading practices, intertextuality between code and rendered text, algorithmic mechanisms of control on intertextuality, and skeuomorphic authenticity. ...
Jamie: "The almond-tasting pigs and fruit are made of…."
Silence. Josh pulls out his smart phone. Josh: "I'll look it up." Jamie: "No, that's too easy." Darby: "Let's try to remember it." ...
doi:10.11575/prism/39484
fatcat:5udqjkpzyngmdlt5bpm77nl6lq
Applications of memristors in conventional analogue electronics
2016
This platform allows for a wide range of different pulsing algorithms to be applied on individual devices, or on crossbars of memristive elements, and is used throughout this dissertation. ...
Next, the observed volatile dynamics of memristors are exploited in two separate sequence detectors, with applications in neuromorphic engineering. Finally, the memris [...] ...
Moore's Law. ...
doi:10.25560/43370
fatcat:yr5ss54agrbyvimeosx6h3wdae
Privacy in Panopticon 2.0: applying Kant's formula of humanity to Internet privacy
2022
On the internet, ensuing challenges to privacy are further exacerbated by the ongoing dispute about what privacy is and why it matters. ...
In response to this dispute, I argue first that privacy can be defined by reference to the notion of access, and second that privacy matters both instrumentally and non-instrumentally,for reasons of dignity ...
The defendant challenged his sentence because he had not been allowed to see the algorithm's workings, but an appeal court found against him, holding that mere knowledge of the algorithm allowed for sufficient ...
doi:10.25949/19427573
fatcat:6cybqhl4jndnti26tq755uq33y
Institutional, Technological, and Strategic Factors in the Global Integrated-Circuit Industry: The Persistence of Organizational Forms
[chapter]
Struggles for Survival
It is projected that Moore's law will continue to be valid for at least the next 15 years. ...
industry because these two devices give material expression to Moore's law. ...
doi:10.1007/4-431-28916-x_5
fatcat:laeki3hmhvc3nf7g7xhl6eceyi
Pharmacopornographic Subjectivity in the Work of Paul B. Preciado
2018
In Preciado's writing, 'pharmacopornographic' describes the entwined influence and dominance of the pharmaceutical and pornographic industries, and the thesis analyses how they produce 'pharmacopornographic ...
This research analyses how pharmacological and pornographic industries affect the design and production of genders and subjectivities. ...
those for whom access to other kinds of employment is checked by immigration laws' (p. 312). ...
doi:10.17863/cam.32468
fatcat:6naqtvhikbedphlr7jpgn5vjdm
Forging Chrome: Media Influence on the Technological Development of Virtual Reality Systems
[article]
2011
My thesis constructs a historiography of the computing industry in the 1980s to examine the parallels between the works of fiction and the actual implementations of virtual reality. ...
Using the cultural evolutionary framework of memetics to trace the connections between the fields of technology and literature can demonstrate the points where the different fields interact. ...
The maxim of Moore's Law regarding the doubling of computing power every 18 months has largely held true since the law was introduced in 1965 (Chesbrough, 2003, p.114) . ...
doi:10.11575/prism/11626
fatcat:7ekxzwknojgivobot2ye5ie6ay
Freedom of Expression: Overzealous Copyright Bozos and Other Enemies of Creativity
2005
unpublished
To give but one major counterexample, the Internet owes its very existence to the fact that most of its foundational protocols, codes, applications, and architecture were not heavily protected. ...
challenged adolescents. ...
"It actually works to really generate traffic and interest and activity at the Web site, and in the band," says Thom. ...
fatcat:g3g2tf2e7vdkxfenuhewjymr7a
« Previous
Showing results 1 — 15 out of 20 results