208 research outputs found

    Morally Respectful Listening and its Epistemic Consequences

    Get PDF
    What does it mean to listen to someone respectfully, that is, insofar as they are due recognition respect? This paper addresses that question and gives the following answer: it is to listen in such a way that you are open to being surprised. A specific interpretation of this openness to surprise is then defended

    Implementation of a Stream-Based IP Flow Record Query Language

    Full text link

    The Periodic Standing-Wave Approximation: Overview and Three Dimensional Scalar Models

    Get PDF
    The periodic standing-wave method for binary inspiral computes the exact numerical solution for periodic binary motion with standing gravitational waves, and uses it as an approximation to slow binary inspiral with outgoing waves. Important features of this method presented here are: (i) the mathematical nature of the ``mixed'' partial differential equations to be solved, (ii) the meaning of standing waves in the method, (iii) computational difficulties, and (iv) the ``effective linearity'' that ultimately justifies the approximation. The method is applied to three dimensional nonlinear scalar model problems, and the numerical results are used to demonstrate extraction of the outgoing solution from the standing-wave solution, and the role of effective linearity.Comment: 13 pages RevTeX, 5 figures. New version. A revised form of the nonlinearity produces better result

    The Iowa Homemaker vol.3, no.7

    Get PDF
    Table of Contents Home Economics Cleans House – Division Ready for New Year by Anna E. Richardson, page 1 Storing the Winter’s Supply of Vitamines by C. L. Fitch, page 2 First Hand Acquaintance With Tokyo’s Earthquake by Katherine Cranor, page 3 Hurrah for the Pumpkin Pie by Ruth Elaine Wilson, page 4 Choosing the Fall Hat by Florence Faust, page 5 Who is Responsible for the Child? by An “Old – Maid Aunt”, page 6 A Review of Farm Meats by Viola M. Bell, page 6 Color Hints From Gay October by Ruth Spencer, page 7 Paying Homage to the King of Fruits by Jeanette Beyer, page 8 Sheppard-Towner Bill by Lois Miller Herd, page 9 Buttons and _______ Buttons by Esther Ellen Rayburn, page 9 Candy Popularity by Esther Ellen Rayburn, page 13 Before the Bar of Science by Eda Lord Murphy, page 15 Gingered Pears by Elizabeth Storm, page 1

    Computational fact checking from knowledge networks

    Get PDF
    Traditional fact checking by expert journalists cannot keep up with the enormous volume of information that is now generated online. Computational fact checking may significantly enhance our ability to evaluate the veracity of dubious information. Here we show that the complexities of human fact checking can be approximated quite well by finding the shortest path between concept nodes under properly defined semantic proximity metrics on knowledge graphs. Framed as a network problem this approach is feasible with efficient computational techniques. We evaluate this approach by examining tens of thousands of claims related to history, entertainment, geography, and biographical information using a public knowledge graph extracted from Wikipedia. Statements independently known to be true consistently receive higher support via our method than do false ones. These findings represent a significant step toward scalable computational fact-checking methods that may one day mitigate the spread of harmful misinformation

    SPAM detection: Naïve bayesian classification and RPN expression-based LGP approaches compared

    Get PDF
    An investigation is performed of a machine learning algorithm and the Bayesian classifier in the spam-filtering context. The paper shows the advantage of the use of Reverse Polish Notation (RPN) expressions with feature extraction compared to the traditional Naïve Bayesian classifier used for spam detection assuming the same features. The performance of the two is investigated using a public corpus and a recent private spam collection, concluding that the system based on RPN LGP (Linear Genetic Programming) gave better results compared to two popularly used open source Bayesian spam filters. © Springer International Publishing Switzerland 2016

    Simple Nudges for Better Password Creation

    Get PDF
    Recent security breaches have highlighted the consequences of reusing passwords across online accounts. Recent guidance on password policies by the UK government recommend an emphasis on password length over an extended character set for generating secure but memorable passwords without cognitive overload. This paper explores the role of three nudges in creating website-specific passwords: financial incentive (present vs absent), length instruction (long password vs no instruction) and stimulus (picture present vs not present). Mechanical Turk workers were asked to create a password in one of these conditions and the resulting passwords were evaluated based on character length, resistance to automated guessing attacks, and time taken to create the password. We found that users created longer passwords when asked to do so or when given a financial incentive and these longer passwords were harder to guess than passwords created with no instruction. Using a picture nudge to support password creation did not lead to passwords that were either longer or more resistant to attacks but did lead to account-specific passwords

    Social and ethical checkpoints for bottom-up synthetic biology, or protocells

    Get PDF
    An alternative to creating novel organisms through the traditional “top-down” approach to synthetic biology involves creating them from the “bottom up” by assembling them from non-living components; the products of this approach are called “protocells.” In this paper we describe how bottom-up and top-down synthetic biology differ, review the current state of protocell research and development, and examine the unique ethical, social, and regulatory issues raised by bottom-up synthetic biology. Protocells have not yet been developed, but many expect this to happen within the next five to ten years. Accordingly, we identify six key checkpoints in protocell development at which particular attention should be given to specific ethical, social and regulatory issues concerning bottom-up synthetic biology, and make ten recommendations for responsible protocell science that are tied to the achievement of these checkpoints
    corecore