• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
AI-Complete CAPTCHAs - Computer Engineering and Computer
AI-Complete CAPTCHAs - Computer Engineering and Computer

... (i.e., the synthesis of a human-level intelligence). A problem that is AI-complete is, in other words, just too hard. Examples of AI-complete problems are “The Vision Problem”, building a system that can see as well as a human, and “The Natural Language Problem”, building a system that can understan ...
PDF only
PDF only

... 2015b; Yudkowsky, 2008]. Most such publications address unintended consequences of poor design decisions, incorrectly selected ethical frameworks or limitations of systems, which do not share human values and human common sense in interpreting their goals. This paper does not focus on unintentional ...
Do robots equal humans? Anthropomorphic terminology in LAWS
Do robots equal humans? Anthropomorphic terminology in LAWS

... anthropomorphisation of military robots may be too risky to be accepted, an issue which has already been raised during the debate on LAWS [1, 5, 6]. The reasons why we should avoid anthropomorphism in this particular context include the following: a) Misleading framework of interpretation: Human cha ...
Knowledge Base
Knowledge Base

... • a mineral consisting of nearly pure carbon in crystalline form, usually colorless, the hardest natural substance known; • a gem or other piece cut from this mineral; • a lozenge-shaped plane figure (); • in Baseball, the infield or the whole playing field. Visiting relatives can be boring. • To v ...
experiments in the variety of being - Home page-
experiments in the variety of being - Home page-

... The real questions concern the nature of God and the concepts of God; this approach allows for a “conversation” between ideas, tradition and reality. The question of the existence of God is one of the possibilities of being and our place within and relationship to those possibilities What is the mea ...
Stair Intro to Information Systems
Stair Intro to Information Systems

... 9. Which stage of systems development involves an initial review of the system to see if there is an actual problem, to see if it is worth solving, and to see if it can be solved. This stage also looks for opportunities. a. Systems investigation b. Systems analysis c. Systems design d. Systems imple ...
tharam dillon – curriculum vitae
tharam dillon – curriculum vitae

... is widely cited and therefore has considerable impact. Over the last few years he has been cited several times in over 1000 scientific articles (source: Google Scholar). He has an H-Index of 21 (Google Scholar) which puts him in the top percentile of researchers. Techniques pioneered have also been ...
Faculty of Administrative and Financial Sciences Management
Faculty of Administrative and Financial Sciences Management

... holistic manner by identifying the foundations and principles upon which the information systems, and to identify the different concepts that contain a concept of information systems, data, information, knowledge, And the different types of systems of computer-based and organized, and how it can be ...
Faculty of Administrative and Financial Sciences Management
Faculty of Administrative and Financial Sciences Management

... holistic manner by identifying the foundations and principles upon which the information systems, and to identify the different concepts that contain a concept of information systems, data, information, knowledge, And the different types of systems of computer-based and organized, and how it can be ...
A synopsis of “Philosophy of Computing and Information Technology”
A synopsis of “Philosophy of Computing and Information Technology”

... devise  methodologies  for  incorporating  values  into  the  design  process.    Undoubtedly,  many  will  find  that  their  niche  of  specialty  has  been  underrepresented  in   this  chapter,  but  one  of  our  main  challenges  w ...
Master`s degree in Artificial Intelligence
Master`s degree in Artificial Intelligence

... Intelligence (AI) at the Barcelona School of Informatics of the UPC, the School of Engineering of the Rovira i Virgili University (URV) and the Faculty of Mathematics of the University of Barcelona (UB). It guarantees an interdisciplinary education in which computer science intersects with philosoph ...
using self-organising maps for anomalous behaviour detection in a
using self-organising maps for anomalous behaviour detection in a

... Federal Bureau of Investigation as well as other law enforcement agencies began developing programs to assist in the examination and analysis of computer evidence [1]. However, the rise in Internet and computer-related crime has brought computer forensics increasingly to the fore. Computer forensics ...
Learning to Recover Meaning from Unannotated
Learning to Recover Meaning from Unannotated

... [email protected] ...
Published March 20, 2017
Published March 20, 2017

... and extensive training datasets—a framework referred to as Machine Learning (ML)—to accomplish seemingly intelligent tasks. Unless their programming or training sets have specifically accounted for a particular element, situation, or circumstance, these ML systems are stymied, unable to determine wh ...
Joint issue with NOVÁTICA Artificial Intelligence
Joint issue with NOVÁTICA Artificial Intelligence

... intelligent group behaviour stemming from the cooperation of what are known as agents. It studies how a group of modules cooperate to divide up and share the knowledge of a problem, and how it reaches a solution. DAI focuses on global behaviour, with a predetermined agent behaviour. It studies the t ...
Relevance, evaluation and users
Relevance, evaluation and users

... word counts) rather than linguistic properties (e.g. adjective/noun counts) --- since 1950s – This view of text wasn’t popular in NLP until the 1990s. ...
Introduction to Neuro-fuzzy and Soft computing
Introduction to Neuro-fuzzy and Soft computing

... “AI is the activity of providing such machines as computers with the ability to display behavior that would be regarded as intelligent if it were observed in humans” [R. Mc Leod] “Expert system is a computer program using expert knowledge to attain high levels of performance in a narrow problem are ...
02-Users
02-Users

... High efficiency Users & Tasks 50 ...
CAD/CAPP/CAM INTEGRATION METHODOLOGY FOR THE
CAD/CAPP/CAM INTEGRATION METHODOLOGY FOR THE

... considered during the design phase. Part modelling based on features is being considered as a new paradigm for integrating engineering activities, from design to manufacturing. So, the concept of features has been used in a wide range of applications such as part design and assembly, design for manu ...
SIGCHI Conference Paper Format
SIGCHI Conference Paper Format

... Ubiquitous / pervasive computing (Weiser, 2002; Saha and Mukherjee, 2003) is conceptualized as a new paradigm of humancentric computer interaction by embedding increasingly ubiquitous connected computing devices in an environment to allow seamless integration of everyday objects and activities with ...
History of Computing - Department of Computer Science and
History of Computing - Department of Computer Science and

... purposes. What Turing envisioned was a machine that could do anything, something that we take for granted today. The method of instructing the computer was very important in Turing's concept. He essentially described a machine which knew a few simple instructions. Making the computer perform a parti ...
History of Computing - Department of Computer Science and
History of Computing - Department of Computer Science and

... purposes. What Turing envisioned was a machine that could do anything, something that we take for granted today. The method of instructing the computer was very important in Turing's concept. He essentially described a machine which knew a few simple instructions. Making the computer perform a parti ...
Master of Science DEGREE IN COMPUTER SCIENCE
Master of Science DEGREE IN COMPUTER SCIENCE

... Master of Science Program in Computer Science Advances in computer science lead to improvements in the lives of everyone. Computer Science offers a path to careers in nearly every aspect of human endeavor from science and technology to art, music and entertainment to medicine, to robotics to psychol ...
Close - IJCAI
Close - IJCAI

... with soft quantifiers. Unlike other SRL frameworks whose atoms are Boolean, atoms in PSL can take continuous values in the interval [0, 1], which facilitates analysis of continuous domains such as user behavior in social media. Indeed, in practice user behavior is not always black-and-white. For exa ...
Research on Computer Network Teaching Based on Artificial
Research on Computer Network Teaching Based on Artificial

... necessary decision-making data, information and background material for policy-makers to help clear decision-making goals and identify issues, create or modify the decision model, offers a variety of alternatives programs, and programs to evaluate and optimal selection, through interactive features ...
< 1 ... 41 42 43 44 45 46 47 48 49 ... 98 >

Human–computer interaction

Human-computer interaction (HCI) researches the design and use of computer technology, focusing particularly on the interfaces between people (users) and computers. Researchers in the field of HCI both observe the ways in which humans interact with computers and design technologies that let humans interact with computers in novel ways.As a field of research, Human-Computer Interaction is situated at the intersection of computer science, behavioral sciences, design, media studies, and several other fields of study. The term was popularized by Stuart K. Card and Allen Newell of Carnegie Mellon University and Thomas P. Moran of IBM Research in their seminal 1983 book, The Psychology of Human-Computer Interaction, although the authors first used the term in 1980 and the first known use was in 1975. The term connotes that, unlike other tools with only limited uses (such as a hammer, useful for driving nails, but not much else), a computer has many uses and this takes place as an open-ended dialog between the user and the computer. The notion of dialog likens human-computer interaction to human-to-human interaction, an analogy the discussion of which is crucial to theoretical considerations in the field.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report