28,859 research outputs found
"Consciousness". Selected Bibliography 1970 - 2001
This is a bibliography of books and articles on consciousness in philosophy, cognitive science, and neuroscience over the last 30 years. There are three main sections, devoted to monographs, edited collections of papers, and articles. The first two of these sections are each divided into three subsections containing books in each of the main areas of research. The third section is divided into 12 subsections, with 10 subject headings for philosophical articles along with two additional subsections for articles in cognitive science and neuroscience. Of course the division is somewhat arbitrary, but I hope that it makes the bibliography easier to use.
This bibliography has first been compiled by Thomas Metzinger and David Chalmers to appear in print in two philosophical anthologies on conscious experience (Metzinger 1995a, b). From 1995 onwards it has been continuously updated by Thomas Metzinger, and now is freely available as a PDF-, RTF-, or HTML-file.
This bibliography mainly attempts to cover the Anglo-Saxon and German debates, in a non-annotated, fully formatted way that makes it easy to "cut and paste" from the original file. To a certain degree this bibliography also contains items in other languages than English and German - all submissions in other languages are welcome. Last update of current version: July 13th, 2001
Drip and Mate Operations Acting in Test Tube Systems and Tissue-like P systems
The operations drip and mate considered in (mem)brane computing resemble the
operations cut and recombination well known from DNA computing. We here
consider sets of vesicles with multisets of objects on their outside membrane
interacting by drip and mate in two different setups: in test tube systems, the
vesicles may pass from one tube to another one provided they fulfill specific
constraints; in tissue-like P systems, the vesicles are immediately passed to
specified cells after having undergone a drip or mate operation. In both
variants, computational completeness can be obtained, yet with different
constraints for the drip and mate operations
Recommended from our members
Weapons of mouse destruction: a 3D strategy for combating cut-and-paste plagiarism using the JISC Plagiarism Advisory Service
This article describes an action research project undertaken in the Business Information Technology (BIT) subject group of a post-1992 University Business School to combat the growing menace of cut-and-paste plagiarism. The authors regard plagiarism—the passing off as one’s own, the words and ideas of another—as an academic malpractice that should be deterred, detected and dealt with appropriately. We use these three themes, or dimensions, to structure our account here of an expanding portfolio of tools and techniques we have deployed over a period of three years. Recently the Joint Information Systems Committee’s (JISC) Plagiarism Advisory Service (PAS) has become central to our efforts, and whilst it is certainly useful in structuring student perceptions, detecting and highlighting sections of cut and paste, and providing professional disciplinary evidence, we draw attention to the potentially pivotal role it can play in structuring student perceptions of plagiarism. In particular, we advise that the JISC PAS is used carefully as part of a more considered approach to student plagiarism rather than as a quick and easy panacea. Pilot studies carried out across six undergraduate and postgraduate units have revealed a growing awareness, amongst both academic and student enthusiasts, of the strengths and limitations of this service. Potentially, these limitations, combined with the restricted sanctions available according to university regulations, could constitute a small risk that some students may calculate and be willing to take. We feel it is important whilst working within this framework to adopt other complimentary strategies in order to make the wholesale or part copying of another’s work an irrational choice, even for the desperate student. This article draws upon current plagiarism literature, field observations and a survey of plagiarism perceptions conducted on over 150 final year undergraduate students. We present the findings from our ongoing action research in the form of a ‘3D’ strategy that attempts to share best practice in deterring, detecting, and dealing appropriately with cut-and-paste plagiarism. Our findings indicate that students do perceive the JISC PAS as effective across all three dimensions, but this perception can be altered significantly depending upon how the service is presented as part of a broader set of strategies to combat student plagiarism. In particular, we have found that allowing students to see the comparison report output from the JISC PAS, not only heightens student anxiety regarding speculative accusations of plagiarism, but also significantly reduces their confidence in the service as a reliable and effective detection method
- …