130,967 research outputs found

    Intelligent Computing: The Latest Advances, Challenges and Future

    Get PDF
    Computing is a critical driving force in the development of human civilization. In recent years, we have witnessed the emergence of intelligent computing, a new computing paradigm that is reshaping traditional computing and promoting digital revolution in the era of big data, artificial intelligence and internet-of-things with new computing theories, architectures, methods, systems, and applications. Intelligent computing has greatly broadened the scope of computing, extending it from traditional computing on data to increasingly diverse computing paradigms such as perceptual intelligence, cognitive intelligence, autonomous intelligence, and human-computer fusion intelligence. Intelligence and computing have undergone paths of different evolution and development for a long time but have become increasingly intertwined in recent years: intelligent computing is not only intelligence-oriented but also intelligence-driven. Such cross-fertilization has prompted the emergence and rapid advancement of intelligent computing. Intelligent computing is still in its infancy and an abundance of innovations in the theories, systems, and applications of intelligent computing are expected to occur soon. We present the first comprehensive survey of literature on intelligent computing, covering its theory fundamentals, the technological fusion of intelligence and computing, important applications, challenges, and future perspectives. We believe that this survey is highly timely and will provide a comprehensive reference and cast valuable insights into intelligent computing for academic and industrial researchers and practitioners

    Natural Computational Architectures for Cognitive Info-Communication

    Get PDF
    Recent comprehensive overview of 40 years of research in cognitive architectures, (Kotseruba and Tsotsos 2020), evaluates modelling of the core cognitive abilities in humans, but only marginally addresses biologically plausible approaches based on natural computation. This mini review presentsa set of perspectives and approaches which have shaped the development of biologically inspired computational models in the recent past that can lead to the development of biologically more realistic cognitive architectures. For describing continuum of natural cognitive architectures, from basal cellular to human-level cognition, we use evolutionary info-computational framework, where natural/ physical/ morphological computation leads to evolution of increasingly complex cognitive systems. Forty years ago, when the first cognitive architectures have been proposed, understanding of cognition, embodiment and evolution was different. So was the state of the art of information physics, bioinformatics, information chemistry, computational neuroscience, complexity theory, selforganization, theory of evolution, information and computation. Novel developments support a constructive interdisciplinary framework for cognitive architectures in the context of computing nature, where interactions between constituents at different levels of organization lead to complexification of agency and increased cognitive capacities. We identify several important research questions for further investigation that can increase understanding of cognition in nature and inspire new developments of cognitive technologies. Recently, basal cell cognition attracted a lot of interest for its possible applications in medicine, new computing technologies, as well as micro- and nanorobotics. Bio-cognition of cells connected into tissues/organs, and organisms with the group (social) levels of information processing provides insights into cognition mechanisms that can support the development of new AI platforms and cognitive robotics

    Integrating Social and Economic Models of Responding to Privacy Messages in Mobile Computing: A Research Agenda

    Get PDF
    Mobile computing has provided technology to an unprecedented user base and has created a market for applications that is expected to reach $77 billion by 2017, involving over 268 billion downloads. Nearly every download involves privacy messages that request permissions to access information such as contact, calendar, and location information. Recent cases have revealed that users are often surprised when they discover the permissions they have granted, which implies that not everyone reads them carefully. In this paper we propose a research agenda focusing on the decisions that users make about those permissions requests. Several theories provide promising antecedents to explain acceptance of privacy permissions. Nine propositions are presented, with three from each research bases from social, economic, and cognitive perspectives. The research agenda thus is a combination hybrid social/economic/cognitive approach. The agenda complements extant research that has focused on privacy calculus theory

    Memristive and neuromorphic behavior in a Li x CoO 2 nanobattery

    Get PDF
    International audienceThe phenomenon of resistive switching (RS), which was initially linked to non-volatile resistive memory applications, has recently also been associated with the concept of memristors, whose adjustable multilevel resistance characteristics open up unforeseen perspectives in cognitive computing. Herein, we demonstrate that the resistance states of Li(x)CoO2 thin film-based metal-insulator-metal (MIM) solid-state cells can be tuned by sequential programming voltage pulses, and that these resistance states are dramatically dependent on the pulses input rate, hence emulating biological synapse plasticity. In addition, we identify the underlying electrochemical processes of RS in our MIM cells, which also reveal a nanobattery-like behavior, leading to the generation of electrical signals that bring an unprecedented new dimension to the connection between memristors and neuromorphic systems. Therefore, these LixCoO2-based MIM devices allow for a combination of possibilities, offering new perspectives of usage in nanoelectronics and bio-inspired neuromorphic circuits

    Considering Human Aspects on Strategies for Designing and Managing Distributed Human Computation

    Full text link
    A human computation system can be viewed as a distributed system in which the processors are humans, called workers. Such systems harness the cognitive power of a group of workers connected to the Internet to execute relatively simple tasks, whose solutions, once grouped, solve a problem that systems equipped with only machines could not solve satisfactorily. Examples of such systems are Amazon Mechanical Turk and the Zooniverse platform. A human computation application comprises a group of tasks, each of them can be performed by one worker. Tasks might have dependencies among each other. In this study, we propose a theoretical framework to analyze such type of application from a distributed systems point of view. Our framework is established on three dimensions that represent different perspectives in which human computation applications can be approached: quality-of-service requirements, design and management strategies, and human aspects. By using this framework, we review human computation in the perspective of programmers seeking to improve the design of human computation applications and managers seeking to increase the effectiveness of human computation infrastructures in running such applications. In doing so, besides integrating and organizing what has been done in this direction, we also put into perspective the fact that the human aspects of the workers in such systems introduce new challenges in terms of, for example, task assignment, dependency management, and fault prevention and tolerance. We discuss how they are related to distributed systems and other areas of knowledge.Comment: 3 figures, 1 tabl

    Towards trusted volunteer grid environments

    Full text link
    Intensive experiences show and confirm that grid environments can be considered as the most promising way to solve several kinds of problems relating either to cooperative work especially where involved collaborators are dispersed geographically or to some very greedy applications which require enough power of computing or/and storage. Such environments can be classified into two categories; first, dedicated grids where the federated computers are solely devoted to a specific work through its end. Second, Volunteer grids where federated computers are not completely devoted to a specific work but instead they can be randomly and intermittently used, at the same time, for any other purpose or they can be connected or disconnected at will by their owners without any prior notification. Each category of grids includes surely several advantages and disadvantages; nevertheless, we think that volunteer grids are very promising and more convenient especially to build a general multipurpose distributed scalable environment. Unfortunately, the big challenge of such environments is, however, security and trust. Indeed, owing to the fact that every federated computer in such an environment can randomly be used at the same time by several users or can be disconnected suddenly, several security problems will automatically arise. In this paper, we propose a novel solution based on identity federation, agent technology and the dynamic enforcement of access control policies that lead to the design and implementation of trusted volunteer grid environments.Comment: 9 Pages, IJCNC Journal 201
    corecore