8,770 research outputs found

    Semantics and the Computational Paradigm in Cognitive Psychology

    Get PDF
    There is a prevalent notion among cognitive scientists and philosophers of mind that computers are merely formal symbol manipulators, performing the actions they do solely on the basis of the syntactic properties of the symbols they manipulate. This view of computers has allowed some philosophers to divorce semantics from computational explanations. Semantic content, then, becomes something one adds to computational explanations to get psychological explanations. Other philosophers, such as Stephen Stich, have taken a stronger view, advocating doing away with semantics entirely. This paper argues that a correct account of computation requires us to attribute content to computational processes in order to explain which functions are being computed. This entails that computational psychology must countenance mental representations. Since anti-semantic positions are incompatible with computational psychology thus construed, they ought to be rejected. Lastly, I argue that in an important sense, computers are not formal symbol manipulators

    Gaming security by obscurity

    Get PDF
    Shannon sought security against the attacker with unlimited computational powers: *if an information source conveys some information, then Shannon's attacker will surely extract that information*. Diffie and Hellman refined Shannon's attacker model by taking into account the fact that the real attackers are computationally limited. This idea became one of the greatest new paradigms in computer science, and led to modern cryptography. Shannon also sought security against the attacker with unlimited logical and observational powers, expressed through the maxim that "the enemy knows the system". This view is still endorsed in cryptography. The popular formulation, going back to Kerckhoffs, is that "there is no security by obscurity", meaning that the algorithms cannot be kept obscured from the attacker, and that security should only rely upon the secret keys. In fact, modern cryptography goes even further than Shannon or Kerckhoffs in tacitly assuming that *if there is an algorithm that can break the system, then the attacker will surely find that algorithm*. The attacker is not viewed as an omnipotent computer any more, but he is still construed as an omnipotent programmer. So the Diffie-Hellman step from unlimited to limited computational powers has not been extended into a step from unlimited to limited logical or programming powers. Is the assumption that all feasible algorithms will eventually be discovered and implemented really different from the assumption that everything that is computable will eventually be computed? The present paper explores some ways to refine the current models of the attacker, and of the defender, by taking into account their limited logical and programming powers. If the adaptive attacker actively queries the system to seek out its vulnerabilities, can the system gain some security by actively learning attacker's methods, and adapting to them?Comment: 15 pages, 9 figures, 2 tables; final version appeared in the Proceedings of New Security Paradigms Workshop 2011 (ACM 2011); typos correcte

    On Formal Methods for Collective Adaptive System Engineering. {Scalable Approximated, Spatial} Analysis Techniques. Extended Abstract

    Full text link
    In this extended abstract a view on the role of Formal Methods in System Engineering is briefly presented. Then two examples of useful analysis techniques based on solid mathematical theories are discussed as well as the software tools which have been built for supporting such techniques. The first technique is Scalable Approximated Population DTMC Model-checking. The second one is Spatial Model-checking for Closure Spaces. Both techniques have been developed in the context of the EU funded project QUANTICOL.Comment: In Proceedings FORECAST 2016, arXiv:1607.0200

    Is More Better? The Impact of Postsecondary Education on the Economic and Social Well-Being of American Society

    Get PDF
    Provides a review of research literature that examines the impact of higher education on individuals and society. Looks at economic and non-economic benefits and costs associated with an increase in public investment in postsecondary education

    The Astropy Problem

    Get PDF
    The Astropy Project (http://astropy.org) is, in its own words, "a community effort to develop a single core package for Astronomy in Python and foster interoperability between Python astronomy packages." For five years this project has been managed, written, and operated as a grassroots, self-organized, almost entirely volunteer effort while the software is used by the majority of the astronomical community. Despite this, the project has always been and remains to this day effectively unfunded. Further, contributors receive little or no formal recognition for creating and supporting what is now critical software. This paper explores the problem in detail, outlines possible solutions to correct this, and presents a few suggestions on how to address the sustainability of general purpose astronomical software

    Automated precision passing system

    Get PDF
    Athletes are always seeking ways to improve their performance. Down time and a lack of capable throwers prevent athletic receivers from practicing their skills. We hope to aid athletes in receiving drills within their respective sports and increase practice efficiency. In order to achieve this, the machine has one major axis of rotation driven by a motor. This enables it to adjust where the ball is being thrown. Using an Arduino Uno coupled with a Roboteq AX1500 motor driver, the Automated Precision Passing System is able to throw a ball to a specified point in space by adjusting both the azimuth and ball-throwing motor speed. Our testing shows that our prototype has the ability to position itself in three different orientations as well as adjust the launch motor speed, but we were unable to launch the ball the original distance that we desired. From this project, we gained valuable knowledge in the areas of machine design, control systems, and project management. In order to continue the project and create a functional consumer product there are several improvements that need to be made to the system. The Automated Precision Passing System needs to be more rigid, have more power, and include more throwing positions

    Spartan Daily October 24, 2012

    Get PDF
    Volume 139, Issue 30https://scholarworks.sjsu.edu/spartandaily/1346/thumbnail.jp

    Spartan Daily October 24, 2012

    Get PDF
    Volume 139, Issue 30https://scholarworks.sjsu.edu/spartandaily/1346/thumbnail.jp
    • …
    corecore