169,091 research outputs found

    A Memento of Complexity: The Rhetorics of Memory, Ambience, and Emergence

    Get PDF
    Drawing from complexity theory, this dissertation develops a schema of rhetorical memory that exhibits extended characteristics. Scholars traditionally conceptualize memory, the fourth canon in classical rhetoric, as place (loci) or image (phantasm). However, memory rhetoric resists the traditional loci-phantasm framework and instead emerges from enmeshments of interiority, collectivity, and technology. Emergence considers the dynamics of fundamental parts that generate complex systems and offers a methodological lens to theorizing memory. The resulting construct informs everyday life, which includes interfacing with pervasive computing or sensing familiarity. Further, congruently with a neurological turn that contradicts simplification, this dissertation resituates rhetorical memory as generative to imagination or perception

    Perception and Cognition Are Largely Independent, but Still Affect Each Other in Systematic Ways: Arguments from Evolution and the Consciousness-Attention Dissociation

    Get PDF
    The main thesis of this paper is that two prevailing theories about cognitive penetration are too extreme, namely, the view that cognitive penetration is pervasive and the view that there is a sharp and fundamental distinction between cognition and perception, which precludes any type of cognitive penetration. These opposite views have clear merits and empirical support. To eliminate this puzzling situation, we present an alternative theoretical approach that incorporates the merits of these views into a broader and more nuanced explanatory framework. A key argument we present in favor of this framework concerns the evolution of intentionality and perceptual capacities. An implication of this argument is that cases of cognitive penetration must have evolved more recently and that this is compatible with the cognitive impenetrability of early perceptual stages of processing information. A theoretical approach that explains why this should be the case is the consciousness and attention dissociation framework. The paper discusses why concepts, particularly issues concerning concept acquisition, play an important role in the interaction between perception and cognition

    Cognitively-inspired Agent-based Service Composition for Mobile & Pervasive Computing

    Full text link
    Automatic service composition in mobile and pervasive computing faces many challenges due to the complex and highly dynamic nature of the environment. Common approaches consider service composition as a decision problem whose solution is usually addressed from optimization perspectives which are not feasible in practice due to the intractability of the problem, limited computational resources of smart devices, service host's mobility, and time constraints to tailor composition plans. Thus, our main contribution is the development of a cognitively-inspired agent-based service composition model focused on bounded rationality rather than optimality, which allows the system to compensate for limited resources by selectively filtering out continuous streams of data. Our approach exhibits features such as distributedness, modularity, emergent global functionality, and robustness, which endow it with capabilities to perform decentralized service composition by orchestrating manifold service providers and conflicting goals from multiple users. The evaluation of our approach shows promising results when compared against state-of-the-art service composition models.Comment: This paper will appear on AIMS'19 (International Conference on Artificial Intelligence and Mobile Services) on June 2

    Agri-Food Traceability Management using a RFID System with Privacy Protection

    Get PDF
    In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in food, an efficient tracking and tracing system is required. RFID devices allow recording all useful information for traceability directly on the commodity. The security issues are discussed and two different methods based on public cryptography are proposed and evaluated. The first algorithm uses a nested RSA based structure to improve security, while the second also provides authenticity of data. An experimental analysis demonstrated that the proposed system is well suitable on PDAs to
    corecore