8,770 research outputs found
Semantics and the Computational Paradigm in Cognitive Psychology
There is a prevalent notion among cognitive scientists and philosophers of mind that computers are merely formal symbol manipulators, performing the actions they do solely on the basis of the syntactic properties of the symbols they manipulate. This view of computers has allowed some philosophers to divorce semantics from computational explanations. Semantic content, then, becomes something one adds to computational explanations to get psychological explanations. Other philosophers, such as Stephen Stich, have taken a stronger view, advocating doing away with semantics entirely. This paper argues that a correct account of computation requires us to attribute content to computational processes in order to explain which functions are being computed. This entails that computational psychology must countenance mental representations. Since anti-semantic positions are incompatible with computational psychology thus construed, they ought to be rejected. Lastly, I argue that in an important sense, computers are not formal symbol manipulators
Gaming security by obscurity
Shannon sought security against the attacker with unlimited computational
powers: *if an information source conveys some information, then Shannon's
attacker will surely extract that information*. Diffie and Hellman refined
Shannon's attacker model by taking into account the fact that the real
attackers are computationally limited. This idea became one of the greatest new
paradigms in computer science, and led to modern cryptography.
Shannon also sought security against the attacker with unlimited logical and
observational powers, expressed through the maxim that "the enemy knows the
system". This view is still endorsed in cryptography. The popular formulation,
going back to Kerckhoffs, is that "there is no security by obscurity", meaning
that the algorithms cannot be kept obscured from the attacker, and that
security should only rely upon the secret keys. In fact, modern cryptography
goes even further than Shannon or Kerckhoffs in tacitly assuming that *if there
is an algorithm that can break the system, then the attacker will surely find
that algorithm*. The attacker is not viewed as an omnipotent computer any more,
but he is still construed as an omnipotent programmer.
So the Diffie-Hellman step from unlimited to limited computational powers has
not been extended into a step from unlimited to limited logical or programming
powers. Is the assumption that all feasible algorithms will eventually be
discovered and implemented really different from the assumption that everything
that is computable will eventually be computed? The present paper explores some
ways to refine the current models of the attacker, and of the defender, by
taking into account their limited logical and programming powers. If the
adaptive attacker actively queries the system to seek out its vulnerabilities,
can the system gain some security by actively learning attacker's methods, and
adapting to them?Comment: 15 pages, 9 figures, 2 tables; final version appeared in the
Proceedings of New Security Paradigms Workshop 2011 (ACM 2011); typos
correcte
On Formal Methods for Collective Adaptive System Engineering. {Scalable Approximated, Spatial} Analysis Techniques. Extended Abstract
In this extended abstract a view on the role of Formal Methods in System
Engineering is briefly presented. Then two examples of useful analysis
techniques based on solid mathematical theories are discussed as well as the
software tools which have been built for supporting such techniques. The first
technique is Scalable Approximated Population DTMC Model-checking. The second
one is Spatial Model-checking for Closure Spaces. Both techniques have been
developed in the context of the EU funded project QUANTICOL.Comment: In Proceedings FORECAST 2016, arXiv:1607.0200
Is More Better? The Impact of Postsecondary Education on the Economic and Social Well-Being of American Society
Provides a review of research literature that examines the impact of higher education on individuals and society. Looks at economic and non-economic benefits and costs associated with an increase in public investment in postsecondary education
The Astropy Problem
The Astropy Project (http://astropy.org) is, in its own words, "a community
effort to develop a single core package for Astronomy in Python and foster
interoperability between Python astronomy packages." For five years this
project has been managed, written, and operated as a grassroots,
self-organized, almost entirely volunteer effort while the software is used by
the majority of the astronomical community. Despite this, the project has
always been and remains to this day effectively unfunded. Further, contributors
receive little or no formal recognition for creating and supporting what is now
critical software. This paper explores the problem in detail, outlines possible
solutions to correct this, and presents a few suggestions on how to address the
sustainability of general purpose astronomical software
Automated precision passing system
Athletes are always seeking ways to improve their performance. Down time and a lack of capable throwers prevent athletic receivers from practicing their skills. We hope to aid athletes in receiving drills within their respective sports and increase practice efficiency. In order to achieve this, the machine has one major axis of rotation driven by a motor. This enables it to adjust where the ball is being thrown. Using an Arduino Uno coupled with a Roboteq AX1500 motor driver, the Automated Precision Passing System is able to throw a ball to a specified point in space by adjusting both the azimuth and ball-throwing motor speed. Our testing shows that our prototype has the ability to position itself in three different orientations as well as adjust the launch motor speed, but we were unable to launch the ball the original distance that we desired. From this project, we gained valuable knowledge in the areas of machine design, control systems, and project management. In order to continue the project and create a functional consumer product there are several improvements that need to be made to the system. The Automated Precision Passing System needs to be more rigid, have more power, and include more throwing positions
Spartan Daily October 24, 2012
Volume 139, Issue 30https://scholarworks.sjsu.edu/spartandaily/1346/thumbnail.jp
Spartan Daily October 24, 2012
Volume 139, Issue 30https://scholarworks.sjsu.edu/spartandaily/1346/thumbnail.jp
- …