-
Notifications
You must be signed in to change notification settings - Fork 35
/
test_get_author.yaml
1216 lines (1215 loc) · 104 KB
/
test_get_author.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
interactions:
- request:
body: ''
headers:
accept:
- '*/*'
accept-encoding:
- gzip, deflate
connection:
- keep-alive
host:
- api.semanticscholar.org
user-agent:
- python-httpx/0.25.1
method: GET
uri: https://api.semanticscholar.org/graph/v1/author/2262347?fields=affiliations,authorId,citationCount,externalIds,hIndex,homepage,name,paperCount,papers,papers.abstract,papers.authors,papers.citationCount,papers.corpusId,papers.externalIds,papers.fieldsOfStudy,papers.influentialCitationCount,papers.isOpenAccess,papers.journal,papers.openAccessPdf,papers.paperId,papers.publicationDate,papers.publicationTypes,papers.publicationVenue,papers.referenceCount,papers.s2FieldsOfStudy,papers.title,papers.url,papers.venue,papers.year,url
response:
content: '{"authorId": "2262347", "externalIds": {"DBLP": ["Alan M. Turing"]},
"url": "https://www.semanticscholar.org/author/2262347", "name": "A. Turing",
"affiliations": [], "homepage": null, "paperCount": 59, "citationCount": 13236,
"hIndex": 22, "papers": [{"paperId": "5d10faffeae5e9f2ae868626b29e6e9b8047cecb",
"externalIds": {"CorpusId": 251848799}, "corpusId": 251848799, "publicationVenue":
null, "url": "https://www.semanticscholar.org/paper/5d10faffeae5e9f2ae868626b29e6e9b8047cecb",
"title": "Dystopian or Utopian? Two Images of Alan Turing", "abstract": "Turing
made intriguing statements about the future of arti\ufb01cial intelligence (AI)
in society. He predicted that machines would eventually \u2018compete with men
in all purely intellectual \ufb01elds,\u2019 and added that at some stage they
could be expected \u2018to take control.\u2019 Turing has been associated by
his biographer, Andrew Hodges, with Dr. Frankenstein from Mary Shelley\u2019s
dystopian novel. However, he has also been described by his contemporary Geoffrey
Jefferson as a \u2018scienti\ufb01c\u2019 Percy B. Shelley, the English Romantic
poet who was posthumously championed as a utopian and radical thinker. This
article then asks: in what way did Turing envision a society permeated with
intelligent machines? Did he see it as a utopia or a dystopia? These questions
are thoroughly examined using Turing\u2019s own texts and related sources. This
study reconstructs Turing\u2019s historical context in postwar England and analyzes
his irony and sense of humor, as well as the in\ufb02uence of Samuel Butler
on his vision. Contrary to recent views in AI science and \ufb01ction, on the
one hand, a mismatch is shown between Turing and the incautious Frankenstein;
on the other hand, Turing\u2019s radical Shelley-like qualities are substantiated.
The article shows that Turing\u2019s utopianism entrusted intelligent machines
with the task of teaching lessons of rationality and intellectual integrity
over our place in nature and prejudices. Further, Turing\u2019s irony is shown
to have targeted intellectuals who sacri\ufb01ce independent thinking to retain
their power. These, he hoped, would be eventually rivaled and surpassed by intelligent
machines.", "venue": "", "year": 2022, "referenceCount": 58, "citationCount":
0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null,
"fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Art", "source": "s2-fos-model"}],
"publicationTypes": null, "publicationDate": null, "journal": null, "authors":
[{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "6b7b392d5f3284a78fd559439bc735f3f0b08bae",
"externalIds": {"DBLP": "journals/cryptologia/X20", "DOI": "10.1080/01611194.2019.1650846",
"CorpusId": 212727442}, "corpusId": 212727442, "publicationVenue": {"id": "ec317d71-24e9-4750-b911-76378b2fa378",
"name": "Cryptologia", "type": "journal", "issn": "0161-1194", "url": "http://www.informaworld.com/1558-1586",
"alternate_urls": ["http://www.tandfonline.com/loi/ucry20", "http://www.tandfonline.com/toc/ucry20/current#.UkSZ03nD_Qw"]},
"url": "https://www.semanticscholar.org/paper/6b7b392d5f3284a78fd559439bc735f3f0b08bae",
"title": "Review of two collections of essays about Alan Turing", "abstract":
"2012 was the Alan Turing Year \u2014 the celebration of the 100th anniversary
of Alan Turing\u2019s birth. Turing\u2019s biographer Andrew Hodges in the \u201cForward\u201d
to The Turing Guide comments that \u201cTuring\u2019s centenary year reflected
a general public sense that the issues of Alan Turing\u2019s life and work are
as relevant as ever in the twentyfirst century.\u201d The Turing Guide consists
of 42 essays that are written for general readers and that celebrate Turing\u2019s:
life (38 pages), accomplishments in mathematics (44 pages), codebreaking (120
pages), On Computable Numbers and the Turing machine (36 pages), postwar work
on computers (67 pages), contributions to morphogenesis (32 pages), ideas related
to machine intelligence (86 pages), and legacy (32 pages). Eleven essays deal
directly with codebreaking. Copeland either wrote, participated in the writing
of, or revised 16 of the essays. Of the eight essays in the section \u201cArtificial
Intelligence and the Mind,\u201d three were written by Diane Proudfoot and one
includes her as a coauthor with Copeland (who wrote one other essay and coauthored
a third essay in that section). The book begins with an overview of Turing\u2019s
life and work by Copeland and Bowen. The essay is mostly a timeline of Turing\u2019s
life. The authors suggest that Turing\u2019s death might have been accidental.
Chapter 3, \u201cMeeting a Genius\u201d (4 pages), is by mathematician and Bletchley
Park codebreaker Peter Hilton (1923\u20132010). Notes to the chapter (p. 485)
state that the chapter was \u201cassembled by Jack Copeland\u201d and \u201cpublished
with the permission of [Hilton\u2019s] wife.\u201d It is also noted that \u201c[in]
2001 and again in 2002 [Hilton] visited Copeland at the University of Canterbury
in New Zealand, where he delivered lectures on Turing and codebreaking. [The]
chapter is a compilation of extracts from [Hilton\u2019s] papers and notes left
in New Zealand, together with extracts from [Hilton\u2019s]", "venue": "Cryptologia",
"year": 2020, "referenceCount": 2, "citationCount": 0, "influentialCitationCount":
0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer
Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"},
{"category": "Art", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle",
"Review"], "publicationDate": "2020-01-02", "journal": {"volume": "44", "pages":
"82 - 86", "name": "Cryptologia"}, "authors": [{"authorId": "2262347", "name":
"A. Turing"}, {"authorId": "1772040", "name": "Jonathan P. Bowen"}, {"authorId":
"3075367", "name": "Mark D. Sprevak"}, {"authorId": "2109033245", "name": "Robin
J. Wilson"}, {"authorId": "2085428", "name": "A. Bokulich"}]}, {"paperId": "fd77c9ac5ead99b216633aa16d9b664516e6d24a",
"externalIds": {"DOI": "10.1007/978-1-4842-6258-0_10", "CorpusId": 240057602},
"corpusId": 240057602, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/fd77c9ac5ead99b216633aa16d9b664516e6d24a",
"title": "Text Processing", "abstract": null, "venue": "Raku Recipes", "year":
2020, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0,
"isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy":
[{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes":
null, "publicationDate": null, "journal": {"name": "Raku Recipes"}, "authors":
[{"authorId": "72482255", "name": "C. Gregg"}, {"authorId": "1764547", "name":
"M. Sahami"}, {"authorId": "144124712", "name": "J. Clarke"}, {"authorId": "2262347",
"name": "A. Turing"}]}, {"paperId": "87aebbd963f929cfb5ac46b0facb5128148758ad",
"externalIds": {"CorpusId": 202754269}, "corpusId": 202754269, "publicationVenue":
null, "url": "https://www.semanticscholar.org/paper/87aebbd963f929cfb5ac46b0facb5128148758ad",
"title": "Development of Moore \u2019 s Law", "abstract": "Many theorists would
agree that, had it not been for courseware, the construction of online algorithms
might never have occurred. In this paper, we confirm the visualization of superblocks.
In this paper we argue that the Turing machine can be made pseudorandom, metamorphic,
and low-energy.", "venue": "", "year": 2019, "referenceCount": 27, "citationCount":
0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null,
"fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science",
"source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null,
"journal": null, "authors": [{"authorId": "117077595", "name": "Olivier Pirson"},
{"authorId": "2153307", "name": "R. Stallman"}, {"authorId": "2262347", "name":
"A. Turing"}, {"authorId": "1717349", "name": "D. Knuth"}]}, {"paperId": "ecb77b338846ac6dbaecf953984f8d44e76a8def",
"externalIds": {"CorpusId": 231691745}, "corpusId": 231691745, "publicationVenue":
null, "url": "https://www.semanticscholar.org/paper/ecb77b338846ac6dbaecf953984f8d44e76a8def",
"title": "Machine Learning, a key component in business model transformation",
"abstract": null, "venue": "", "year": 2018, "referenceCount": 38, "citationCount":
1, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null,
"fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science",
"source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null,
"journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]},
{"paperId": "aa2c899534681104e64f0971d7cb1a003dd6efd2", "externalIds": {"CorpusId":
51883623}, "corpusId": 51883623, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/aa2c899534681104e64f0971d7cb1a003dd6efd2",
"title": "What \u2019 s Missing from Deep Learning ?", "abstract": "A neural
network model for a mechanism of visual pattern recognition is proposed in this
paper. The network is self-organized by \"learning without a teacher\", and
acquires an ability to recognize stimulus patterns based on the geometrical
similarity (Gestalt) of their shapes without affected by their positions. This
network is given a nickname \"neocognitron\". After completion of self-organization,
the network has a structure similar to the hierarchy model of the visual nervous
system proposed by Hubel and Wiesel. The network consists of an input layer
(photoreceptor array) followed by a cascade connection of a number of modular
structures, each of which is composed of two layers of cells connected in a
cascade. The first layer of each module consists of \"S-cells'', which show
characteristics similar to simple cells or lower order hypercomplex cells, and
the second layer consists of \"C-cells\" similar to complex cells or higher
order hypercomplex cells. The afferent synapses to each S-cell have plasticity
and are modifiable. The network has an ability of unsupervised learning: We
do not need any \"teacher\" during the process of selforganization, and it is
only needed to present a set of stimulus patterns repeatedly to the input layer
of the network. The network has been simulated on a digital computer. After
repetitive presentation of a set of stimulus patterns, each stimulus pattern
has become to elicit an output only from one of the C-cells of the last layer,
and conversely, this C-cell has become selectively responsive only to that stimulus
pattern. That is, none of the C-cells of the last layer responds to more than
one stimulus pattern. The response of the C-cells of the last layer is not affected
by the pattern''s position at all. Neither is it affected by a small change
in shape nor in size of the stimulus pattern.", "venue": "", "year": 2017, "referenceCount":
0, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false,
"openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category":
"Computer Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate":
null, "journal": null, "authors": [{"authorId": "1708655", "name": "B. Olshausen"},
{"authorId": "145260300", "name": "Helen Wills"}, {"authorId": "2262347", "name":
"A. Turing"}, {"authorId": "41224665", "name": "J. Neumann"}, {"authorId": "1847175",
"name": "M. Minsky"}, {"authorId": "143805238", "name": "John McCarthy"}, {"authorId":
"51083130", "name": "F. Rosenblatt"}, {"authorId": "145707626", "name": "N.
Wiener"}, {"authorId": "2067567609", "name": "Warren S. McCulloch"}, {"authorId":
"50314979", "name": "W. Pitts"}, {"authorId": "3160228", "name": "K. Fukushima"}]},
{"paperId": "b23bc17aa26e4fd9e707698bdfa26d2754a6c6e7", "externalIds": {"MAG":
"2467689444", "CorpusId": 159733415}, "corpusId": 159733415, "publicationVenue":
null, "url": "https://www.semanticscholar.org/paper/b23bc17aa26e4fd9e707698bdfa26d2754a6c6e7",
"title": "The President, the Vice President, the Secretary-Treasurer, and ARNOLD
DRESDEN,2", "abstract": null, "venue": "", "year": 2016, "referenceCount": 0,
"citationCount": 0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf":
null, "fieldsOfStudy": ["History"], "s2FieldsOfStudy": [{"category": "History",
"source": "external"}], "publicationTypes": null, "publicationDate": null, "journal":
{"volume": "", "name": ""}, "authors": [{"authorId": "3154491", "name": "A.
Tarski"}, {"authorId": "50455788", "name": "S. Maclane"}, {"authorId": "40384728",
"name": "H. B. Curry"}, {"authorId": "122394125", "name": "Paul Marhenkei"},
{"authorId": "101931347", "name": "A. Dresden"}, {"authorId": "118436071", "name":
"Karl-Heinz Menger"}, {"authorId": "123809183", "name": "Frederic B. FiTCHc"},
{"authorId": "49957888", "name": "E. Nagel"}, {"authorId": "49836121", "name":
"C. Hempel"}, {"authorId": "145260350", "name": "W. Quine"}, {"authorId": "91132817",
"name": "C. Langford"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId":
"40245151", "name": "F. B. Fitch"}, {"authorId": "104540019", "name": "P. Marhenke"},
{"authorId": "2072295124", "name": "C. Duca"}]}, {"paperId": "293a50e86c2a2f4a2e213a42e057910aeda09d82",
"externalIds": {"MAG": "2185394266", "CorpusId": 125067106}, "corpusId": 125067106,
"publicationVenue": null, "url": "https://www.semanticscholar.org/paper/293a50e86c2a2f4a2e213a42e057910aeda09d82",
"title": "\u2022 Hilbert spaces. Weak derivatives. Classical and weak solutions.
\u2022 Galerkin approximation of elliptic equations. Spectral approximation.
Finite element approximation in one dimension. Energy estimates. \u2022 Parabolic
PDEs. Semigroups of operators. Method of lines. Stability of numerical", "abstract":
null, "venue": "", "year": 2014, "referenceCount": 2, "citationCount": 0, "influentialCitationCount":
0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"],
"s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category":
"Mathematics", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate":
null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "104483519",
"name": "Lecturer Sean Holman"}, {"authorId": "2262347", "name": "A. Turing"},
{"authorId": "103905785", "name": "January Exam"}]}, {"paperId": "9f07386256530a0060d99a1ba483a8f5c1f4194b",
"externalIds": {"MAG": "2029222787", "DOI": "10.1093/ITNOW/BWU030", "CorpusId":
109153053}, "corpusId": 109153053, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/9f07386256530a0060d99a1ba483a8f5c1f4194b",
"title": "Turing: Oracles and Computation", "abstract": null, "venue": "", "year":
2014, "referenceCount": 0, "citationCount": 0, "influentialCitationCount": 0,
"isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"],
"s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"},
{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Philosophy",
"source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2014-03-01",
"journal": {"volume": "56", "pages": "64-65", "name": "Itnow"}, "authors": [{"authorId":
"2262347", "name": "A. Turing"}]}, {"paperId": "0a3aa98358b0dd7fc3e0bcf6eef65d959aff3565",
"externalIds": {"MAG": "2741266234", "CorpusId": 125093480}, "corpusId": 125093480,
"publicationVenue": null, "url": "https://www.semanticscholar.org/paper/0a3aa98358b0dd7fc3e0bcf6eef65d959aff3565",
"title": "Dusting Off the Turing Test", "abstract": "then inter- est theory
and a problem about the observation of quantum systems (now as the quantum Zeno
effect). With his death, train was lost, but the question computa- tion to fundamental
physics has remained. Since the computing given a practical technological arena
in which computation and quantum physics interact excitingly, it has not yet
changed Tur- ing\u0092 s picture of what is computable. There are also thought-experiment
models that explore what it would mean beyond the ally require machine operate
with speed or allow unlim- ited accuracy probe more the nature physical world.
Perhaps the body of ideas is that of Roger Penrose ( 7). These draw strongly
on the very thing motivated Tur- ing\u0092 s early relationship operations to
the imply that uncomputable physics abstract of how states are in the world.
The problem remains: Does computation with discrete symbols a complete the world?
If it does, how can make this connection manifest? If it does not, where does
fail, and what would this tell us about fundamental science?", "venue": "",
"year": 2012, "referenceCount": 1, "citationCount": 6, "influentialCitationCount":
0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"],
"s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}, {"category":
"Physics", "source": "s2-fos-model"}, {"category": "Computer Science", "source":
"s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal":
{"volume": "", "name": ""}, "authors": [{"authorId": "144443425", "name": "A.
Hodges"}, {"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "422ec845a15242fdfc904e1c7d2bfe132c7ec248",
"externalIds": {"CorpusId": 18051598}, "corpusId": 18051598, "publicationVenue":
null, "url": "https://www.semanticscholar.org/paper/422ec845a15242fdfc904e1c7d2bfe132c7ec248",
"title": "PLANES OF MORPHISMS AND THE CHARACTERIZATION OF CONTINUOUSLY INTEGRAL,
COMPLETE RANDOM VARIABLES", "abstract": "Let \u03b8m,\u03bc be an independent,
right-composite, anti-naturally continuous polytope. Recent interest in smooth
systems has centered on describing additive subsets. We show that there exists
a non-universal non-injective subalgebra. In contrast, it is not yet known whether
\u03b8 < D, although [25] does address the issue of existence. So recent developments
in modern integral PDE [25] have raised the question of whether e ( 0 ) 6= log
( 1 \u2016\u03c7\u2016 ) \u222a c ( 1 \u2229 i, \u03c0 )", "venue": "", "year":
2012, "referenceCount": 32, "citationCount": 0, "influentialCitationCount":
0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy":
[{"category": "Mathematics", "source": "s2-fos-model"}], "publicationTypes":
null, "publicationDate": null, "journal": null, "authors": [{"authorId": "12989190",
"name": "M. Lafourcade"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId":
"50294906", "name": "M. Abel"}]}, {"paperId": "4f4b42aa137d5b6df85889cf53901f44cbee643b",
"externalIds": {"MAG": "2187383749", "DOI": "10.7551/mitpress/5123.003.0007",
"CorpusId": 62254832}, "corpusId": 62254832, "publicationVenue": null, "url":
"https://www.semanticscholar.org/paper/4f4b42aa137d5b6df85889cf53901f44cbee643b",
"title": "Could a machine think", "abstract": null, "venue": "", "year": 2012,
"referenceCount": 6, "citationCount": 0, "influentialCitationCount": 0, "isOpenAccess":
false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy":
[{"category": "Psychology", "source": "external"}, {"category": "Philosophy",
"source": "s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}],
"publicationTypes": null, "publicationDate": null, "journal": {"volume": "",
"name": ""}, "authors": [{"authorId": "2055661501", "name": "Pascal Ludwig"},
{"authorId": "2262347", "name": "A. Turing"}, {"authorId": "34493294", "name":
"J. Searle"}]}, {"paperId": "594da152fe98e400c4886d397b29b1ca2d499138", "externalIds":
{"MAG": "2011376516", "DOI": "10.3103/S0005105512020069", "CorpusId": 18880403},
"corpusId": 18880403, "publicationVenue": {"id": "f0c9c66f-486d-49f2-b8ee-32dff504cda1",
"name": "Automatic Documentation and Mathematical Linguistics", "type": "journal",
"alternate_names": ["Autom Doc Math Linguistics", "Nauchno-technicheskaja informacija"],
"issn": "0005-1055", "alternate_issns": ["0548-0027"], "url": "https://link.springer.com/journal/11952",
"alternate_urls": ["http://catalog.viniti.ru/search_extra.asp"]}, "url": "https://www.semanticscholar.org/paper/594da152fe98e400c4886d397b29b1ca2d499138",
"title": "The philosophical view of information and information technology",
"abstract": null, "venue": "Automatic Documentation and Mathematical Linguistics",
"year": 2012, "referenceCount": 15, "citationCount": 1, "influentialCitationCount":
0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"],
"s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category":
"Computer Science", "source": "s2-fos-model"}, {"category": "Philosophy", "source":
"s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-03-01",
"journal": {"volume": "46", "pages": "94-104", "name": "Automatic Documentation
and Mathematical Linguistics"}, "authors": [{"authorId": "69509733", "name":
"Y. Shannon"}, {"authorId": "2229675740", "name": "R. Barrhillel"}, {"authorId":
"2229720434", "name": "F. Carnap"}, {"authorId": "2229720349", "name": "M. Dretske"},
{"authorId": "39617026", "name": "R. Buckland"}, {"authorId": "2229687348",
"name": "Capurro"}, {"authorId": "2229457272", "name": "Eugene Chiu"}, {"authorId":
"2229676890", "name": "Claude Shannon"}, {"authorId": "2227214708", "name":
"Norbert Wiener"}, {"authorId": "2229687779", "name": "Warren Mckalok"}, {"authorId":
"2229068557", "name": "Walter Pitts"}, {"authorId": "2262347", "name": "A. Turing"},
{"authorId": "2229687373", "name": "D. Von Neumann"}, {"authorId": "146926041",
"name": "H. Rashidi Alashty"}]}, {"paperId": "5cfe755938d14edd5422d72215cf8b733f0284fc",
"externalIds": {"MAG": "2054264625", "DBLP": "journals/cryptologia/TuringB12",
"DOI": "10.1080/01611194.2012.713803", "CorpusId": 205488183}, "corpusId": 205488183,
"publicationVenue": {"id": "ec317d71-24e9-4750-b911-76378b2fa378", "name": "Cryptologia",
"type": "journal", "issn": "0161-1194", "url": "http://www.informaworld.com/1558-1586",
"alternate_urls": ["http://www.tandfonline.com/loi/ucry20", "http://www.tandfonline.com/toc/ucry20/current#.UkSZ03nD_Qw"]},
"url": "https://www.semanticscholar.org/paper/5cfe755938d14edd5422d72215cf8b733f0284fc",
"title": "Report on Speech Secrecy System DELILAH, a Technical Description Compiled
by A. M. Turing and Lieutenant D. Bayley REME, 1945\u20131946", "abstract":
"The book groups themselves might be used as a form of cipher, but this is rather
insecure, so that some further process or \u2018\u2018recipher\u2019\u2019 is
usually applied. From the point of view of this reciphering, it is natural to
regard the book groups as virtually plain language. Moreover, the division into
groups is now of little real interest; it is useful to relieve the eye, but
that is all. Let us run the groups together and call the result \u2018\u2018P=L
figures\u2019\u2019:", "venue": "Cryptologia", "year": 2012, "referenceCount":
0, "citationCount": 7, "influentialCitationCount": 1, "isOpenAccess": false,
"openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy":
[{"category": "Computer Science", "source": "external"}, {"category": "Computer
Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"],
"publicationDate": "2012-10-01", "journal": {"volume": "36", "pages": "295 -
340", "name": "Cryptologia"}, "authors": [{"authorId": "2262347", "name": "A.
Turing"}, {"authorId": "84292446", "name": "D. Bayley"}]}, {"paperId": "947efa54175145240c1a33f62321f23db43571e7",
"externalIds": {"DBLP": "phd/Turing38", "MAG": "1970654545", "DOI": "10.1016/b978-044450423-4/50007-3",
"CorpusId": 40363661}, "corpusId": 40363661, "publicationVenue": null, "url":
"https://www.semanticscholar.org/paper/947efa54175145240c1a33f62321f23db43571e7",
"title": "Systems of Logic Based on Ordinals", "abstract": null, "venue": "Alan
Turing''s Systems of Logic", "year": 2012, "referenceCount": 20, "citationCount":
223, "influentialCitationCount": 13, "isOpenAccess": true, "openAccessPdf":
{"url": "https://pure.mpg.de/pubman/item/item_2403325_2/component/file_2403324/Turing_1939_Sysyems.pdf",
"status": null}, "fieldsOfStudy": ["Computer Science", "Mathematics"], "s2FieldsOfStudy":
[{"category": "Computer Science", "source": "external"}, {"category": "Mathematics",
"source": "external"}, {"category": "Computer Science", "source": "s2-fos-model"},
{"category": "Mathematics", "source": "s2-fos-model"}, {"category": "Philosophy",
"source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2012-12-31",
"journal": {"name": "Alan Turing''s Systems of Logic"}, "authors": [{"authorId":
"2262347", "name": "A. Turing"}]}, {"paperId": "300d41307bb946510bdc111463f5fb71b2a21796",
"externalIds": {"MAG": "2274591444", "CorpusId": 124844782}, "corpusId": 124844782,
"publicationVenue": null, "url": "https://www.semanticscholar.org/paper/300d41307bb946510bdc111463f5fb71b2a21796",
"title": "Correspondence with [A.M. Turing]", "abstract": null, "venue": "",
"year": 2011, "referenceCount": 0, "citationCount": 0, "influentialCitationCount":
0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Mathematics"],
"s2FieldsOfStudy": [{"category": "Mathematics", "source": "external"}], "publicationTypes":
null, "publicationDate": "2011-11-21", "journal": {"volume": "", "name": ""},
"authors": [{"authorId": "51326515", "name": "R. Fisher"}, {"authorId": "2262347",
"name": "A. Turing"}]}, {"paperId": "50a1357c04bde76f752aac1dbd2ba2601622ccd4",
"externalIds": {"CorpusId": 8641258}, "corpusId": 8641258, "publicationVenue":
null, "url": "https://www.semanticscholar.org/paper/50a1357c04bde76f752aac1dbd2ba2601622ccd4",
"title": "Alan Mathison Turing Universal Turing Machine", "abstract": "Scatter/gather
I/O must work [54], [59], [62], [68], [68], [70], [70], [70], [95], [95], [114],
[114], [114], [152], [168], [179], [179], [179], [188], [191]. After years of
confusing research into gigabit switches, we confirm the simulation of architecture,
which embodies the structured principles of software engineering. In order to
solve this riddle, we inve stigate how digital-to-analog converters can be applied
to t he", "venue": "", "year": 2011, "referenceCount": 128, "citationCount":
0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null,
"fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science",
"source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null,
"journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]},
{"paperId": "6da083c8833b4000b088ea366f16f1ea8d9b6dad", "externalIds": {"CorpusId":
17718604}, "corpusId": 17718604, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6da083c8833b4000b088ea366f16f1ea8d9b6dad",
"title": "The legacy of Alan Turing Universal Turing Machine", "abstract": "The
investigation of 802.11b has evaluated IPv6, and current trends suggest that
the analysis of local-area networks will soon emerge. Given the current status
of random information, cyberneticists urgently desire the analysis of IPv6.
Our focus here is not on whether SMPs and consistent hashing are often incompatible,
but rather on introducing a novel algorithm for the improvement of multi-processors
(Esparcet).", "venue": "", "year": 2011, "referenceCount": 131, "citationCount":
0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null,
"fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science",
"source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null,
"journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]},
{"paperId": "de7a3c8b0aaf0c84bdaa8c1d7f416a91dbbccc1a", "externalIds": {"CorpusId":
17215741}, "corpusId": 17215741, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/de7a3c8b0aaf0c84bdaa8c1d7f416a91dbbccc1a",
"title": "Alan Turing Universal Turing Machine", "abstract": "In recent years,
much research has been devoted to the synthesis of gigabit switches; on the
other hand, few have explored the refinement of hash tables. In fact, few cryptographers
would disagree with the improvement of the lookaside buffer. In this work, we
use signed technology to show that architecture and superblocks are usually
incompatible.", "venue": "", "year": 2011, "referenceCount": 130, "citationCount":
0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null,
"fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science",
"source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null,
"journal": null, "authors": [{"authorId": "2262347", "name": "A. Turing"}]},
{"paperId": "2c17cdc749e8a639ed78761b23e8e1d8805ae29c", "externalIds": {"CorpusId":
115526721}, "corpusId": 115526721, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2c17cdc749e8a639ed78761b23e8e1d8805ae29c",
"title": "Turing 1950 1 The Imitation Game", "abstract": "I propose to consider
the question, \u201cCan machines think?\u201d This should begin with definitions
of the meaning of the terms \u201cmachine\u201d and \u201cthink.\u201d The definitions
might be framed so as to reflect so far as possible the normal use of the words,
but this attitude is dangerous, If the meaning of the words\u201cmachine\u201dand
\u201cthink\u201d are to be found by examining how they are commonly used it
is difficult to escape the conclusion that the meaning and the answer to the
question, \u201cCan machines think?\u201d is to be sought in a statistical survey
such as a Gallup poll. But this is absurd. Instead of attempting such a definition
I shall replace the question by another, which is closely related to it and
is expressed in relatively unambiguous words. The new form of the problem can
be described in terms of a game which we call the \u201cimitation game.\u201d
It is played with three people, a man (A), a woman (B), and an interrogator
(C) who may be of either sex. The interrogator stays in a room apart front the
other two. The object of the game for the interrogator is to determine which
of the other two is the man and which is the woman. He knows them by labels
X and Y, and at the end of the game he says either \u201cX is A and Y is B\u201d
or \u201cX is B and Y is A.\u201d The interrogator is allowed to put questions
to A and B thus:", "venue": "", "year": 2010, "referenceCount": 0, "citationCount":
0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null,
"fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy", "source":
"s2-fos-model"}, {"category": "Computer Science", "source": "s2-fos-model"}],
"publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors":
[{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "6c9520d25a2f93f1fb4f08bab66d90a1519faaac",
"externalIds": {"MAG": "2479903735", "DOI": "10.14361/9783839403396-004", "CorpusId":
184361851}, "corpusId": 184361851, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6c9520d25a2f93f1fb4f08bab66d90a1519faaac",
"title": "Computermaschinerie und Intelligenz (1950)", "abstract": null, "venue":
"Reader Neue Medien", "year": 2007, "referenceCount": 0, "citationCount": 2,
"influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null,
"fieldsOfStudy": null, "s2FieldsOfStudy": [], "publicationTypes": null, "publicationDate":
"2007-12-31", "journal": {"name": "Reader Neue Medien"}, "authors": [{"authorId":
"2262347", "name": "A. Turing"}]}, {"paperId": "6e369d363e91a5c09cc33907590b768d52657c0f",
"externalIds": {"MAG": "2967838196", "CorpusId": 17359642}, "corpusId": 17359642,
"publicationVenue": null, "url": "https://www.semanticscholar.org/paper/6e369d363e91a5c09cc33907590b768d52657c0f",
"title": "Computing Machinery and Intelligence A.M. Turing", "abstract": "I
propose to consider the question, \"Can machines think?\" This should begin
with definitions of the meaning of the terms \"machine\" and \"think.\" The
definitions might be framed so as to reflect so far as possible the normal use
of the words, but this attitude is dangerous, If the meaning of the words \"machine\"
and \"think\" are to be found by examining how they are commonly used it is
difficult to escape the conclusion that the meaning and the answer to the question,
\"Can machines think? \" is to be sought in a statistical survey such as a Gallup
poll. But this is absurd. Instead of attempting such a definition I shall replace
the question by another, which is closely related to it and is expressed in
relatively unambiguous words.", "venue": "", "year": 2007, "referenceCount":
0, "citationCount": 118, "influentialCitationCount": 2, "isOpenAccess": false,
"openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy":
[{"category": "Computer Science", "source": "external"}, {"category": "Computer
Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate":
null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347",
"name": "A. Turing"}]}, {"paperId": "18ef39d95593b58013e5b959e83056d7136496b5",
"externalIds": {"MAG": "2499467011", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0023",
"CorpusId": 62965306}, "corpusId": 62965306, "publicationVenue": null, "url":
"https://www.semanticscholar.org/paper/18ef39d95593b58013e5b959e83056d7136496b5",
"title": "The Turing\u2013Wilkinson lecture series (1946\u20137)", "abstract":
null, "venue": "", "year": 2005, "referenceCount": 0, "citationCount": 6, "influentialCitationCount":
0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"],
"s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category":
"Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics", "source":
"s2-fos-model"}], "publicationTypes": null, "publicationDate": "2005-04-14",
"journal": {"volume": "", "pages": "459-528", "name": ""}, "authors": [{"authorId":
"2262347", "name": "A. Turing"}, {"authorId": "2056940608", "name": "J. H. Wilkinson"}]},
{"paperId": "2190254a337fd601af32260dc4133d009933ee65", "externalIds": {"MAG":
"2483371858", "DOI": "10.1093/ACPROF:OSO/9780198565932.003.0021", "CorpusId":
64463006}, "corpusId": 64463006, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2190254a337fd601af32260dc4133d009933ee65",
"title": "Proposed electronic calculator (1945)", "abstract": null, "venue":
"", "year": 2005, "referenceCount": 0, "citationCount": 45, "influentialCitationCount":
1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer
Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"},
{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes":
null, "publicationDate": "2005-04-14", "journal": {"volume": "", "pages": "369-454",
"name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId":
"f8465fea1230ba0f7ca3dea3c4c71278ac576e91", "externalIds": {"MAG": "2490852693",
"DOI": "10.1093/ACPROF:OSO/9780198565932.003.0022", "CorpusId": 64507632}, "corpusId":
64507632, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f8465fea1230ba0f7ca3dea3c4c71278ac576e91",
"title": "Notes on memory (1945)", "abstract": null, "venue": "", "year": 2005,
"referenceCount": 0, "citationCount": 1, "influentialCitationCount": 1, "isOpenAccess":
false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"], "s2FieldsOfStudy":
[{"category": "Philosophy", "source": "external"}, {"category": "History", "source":
"s2-fos-model"}], "publicationTypes": null, "publicationDate": "2005-04-14",
"journal": {"volume": "", "pages": "455-458", "name": ""}, "authors": [{"authorId":
"2262347", "name": "A. Turing"}]}, {"paperId": "05b0cd062fa41d0ca2c7608dc59ac93e898a35aa",
"externalIds": {"MAG": "3101684541", "DOI": "10.1093/oso/9780198250791.003.0016",
"CorpusId": 232473093}, "corpusId": 232473093, "publicationVenue": null, "url":
"https://www.semanticscholar.org/paper/05b0cd062fa41d0ca2c7608dc59ac93e898a35aa",
"title": "Intelligent Machinery (1948)", "abstract": null, "venue": "", "year":
2004, "referenceCount": 0, "citationCount": 41, "influentialCitationCount":
4, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer
Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"}],
"publicationTypes": null, "publicationDate": "2004-09-09", "journal": {"volume":
"", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]},
{"paperId": "13103014e997dd6273e2bc3661353d09165cf90c", "externalIds": {"MAG":
"3103227490", "DOI": "10.1093/oso/9780198250791.003.0015", "CorpusId": 229803945},
"corpusId": 229803945, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/13103014e997dd6273e2bc3661353d09165cf90c",
"title": "Lecture on the Automatic Computing Engine (1947)", "abstract": null,
"venue": "", "year": 2004, "referenceCount": 0, "citationCount": 13, "influentialCitationCount":
0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer
Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"},
{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes":
null, "publicationDate": "2004-09-09", "journal": {"volume": "", "name": ""},
"authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "15b2a8b748d8063348071beb106b4921c0ef8ba6",
"externalIds": {"MAG": "3101010549", "DOI": "10.1093/oso/9780198250791.003.0007",
"CorpusId": 232670029}, "corpusId": 232670029, "publicationVenue": null, "url":
"https://www.semanticscholar.org/paper/15b2a8b748d8063348071beb106b4921c0ef8ba6",
"title": "Systems of Logic Based on Ordinals (1938)", "abstract": null, "venue":
"", "year": 2004, "referenceCount": 0, "citationCount": 0, "influentialCitationCount":
0, "isOpenAccess": true, "openAccessPdf": {"url": "https://pure.mpg.de/pubman/item/item_2403325_2/component/file_2403324/Turing_1939_Sysyems.pdf",
"status": null}, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Philosophy",
"source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-09-09",
"journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name":
"A. Turing"}]}, {"paperId": "1bb2114c24263b0489f24f787fef86f33487f802", "externalIds":
{"MAG": "169424043", "DOI": "10.7551/mitpress/6928.003.0016", "CorpusId": 5561670},
"corpusId": 5561670, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/1bb2114c24263b0489f24f787fef86f33487f802",
"title": "Can Automatic Calculating Machines Be Said to Think", "abstract":
"Trainable methodologies and the transistor have garnered profound interest
from both steganographers and cyberinfo rmaticians in the last several years.
Given the current statu s of compact technology, computational biologists particul
arly desire the visualization of forward-error correction, whi ch embodies the
essential principles of networking. Our focus in this paper is not on whether
the infamous certifiable algorit hm for the refinement of thin clients by P.
Jackson et al. [54], [5 8], [59], [62], [68], [68], [70], [95], [95], [99],
[114], [114] , [128], [129], [148], [152], [168], [179], [188], [191] is recursiv
ely enumerable, but rather on constructing a pervasive tool for evaluating Internet
QoS (HolHoveling).", "venue": "", "year": 2004, "referenceCount": 111, "citationCount":
305, "influentialCitationCount": 11, "isOpenAccess": false, "openAccessPdf":
null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category":
"Computer Science", "source": "external"}, {"category": "Computer Science",
"source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null,
"journal": {"volume": "", "pages": "117-132", "name": ""}, "authors": [{"authorId":
"143697232", "name": "M. Newman"}, {"authorId": "2262347", "name": "A. Turing"},
{"authorId": "2060159667", "name": "Geoffrey Jefferson"}, {"authorId": "34635194",
"name": "R. Braithwaite"}, {"authorId": "1692491", "name": "S. Shieber"}]},
{"paperId": "6e28b5b4d15ddd352ca9b5bf1bfd128448a3bcdc", "externalIds": {"MAG":
"593056538", "CorpusId": 60423929}, "corpusId": 60423929, "publicationVenue":
null, "url": "https://www.semanticscholar.org/paper/6e28b5b4d15ddd352ca9b5bf1bfd128448a3bcdc",
"title": "The Essential Turing: Seminal Writings in Computing, Logic, Philosophy,
Artificial Intelligence, and Artificial Life plus The Secrets of Enigma", "abstract":
"Alan Turing 1912-1954 Computable Numbers: A Guide 1. On Computable Numbers,
with an Application to the Entscheidensproblem (1936) 2. On Computable Numbers:
Corrections and Critiques 3. Systems of Logic Based on Ordinals (1938) 4. Letters
on Logic to Max Newman (c. 1940) Enigma 5. History of Hut 8 to December 1941
(1845) 6. Bombe and Spider (1940) 7. Letter to Winston Churchill (1941) 8. Memorandum
to OP-20-G on Naval Enigma (c. 1941) Artificial Intelligence 9. Lecture on the
Automatic Computing Machine (1947) 10. Intelligent Machinery (1948) 11. Computing
Machinery and Intelligence (1950) 12. Intelligent Machinery, A Heretical Theory
(c. 1951) 13. Can Digital Computers Think? 14. Can Automatic Calculating Machines
Be Said to Think? (1952) Artificial Life 15. The Chemical Basis of Morphogenesis
(1952) 16. Chess (1953) 17. Solvable and Unsolvable Problems (1954)", "venue":
"", "year": 2004, "referenceCount": 37, "citationCount": 164, "influentialCitationCount":
11, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer
Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"},
{"category": "Philosophy", "source": "s2-fos-model"}, {"category": "Computer
Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate":
null, "journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347",
"name": "A. Turing"}, {"authorId": "118975427", "name": "J. Copeland"}]}, {"paperId":
"e4b0b7117d580c5ec4b256bd2d918e977ed08aba", "externalIds": {"MAG": "3105675538",
"DOI": "10.1093/oso/9780198250791.003.0013", "CorpusId": 231523578}, "corpusId":
231523578, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/e4b0b7117d580c5ec4b256bd2d918e977ed08aba",
"title": "Memorandum to OP-20-G on Naval Enigma (c.1941)", "abstract": null,
"venue": "", "year": 2004, "referenceCount": 0, "citationCount": 1, "influentialCitationCount":
0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy"],
"s2FieldsOfStudy": [{"category": "Philosophy", "source": "external"}, {"category":
"History", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate":
"2004-09-09", "journal": {"volume": "", "name": ""}, "authors": [{"authorId":
"2262347", "name": "A. Turing"}]}, {"paperId": "ef5e79b3ba502350967ae9bff87243fbf140c8b9",
"externalIds": {"MAG": "3098156012", "DOI": "10.1093/oso/9780198250791.003.0012",
"CorpusId": 230737760}, "corpusId": 230737760, "publicationVenue": null, "url":
"https://www.semanticscholar.org/paper/ef5e79b3ba502350967ae9bff87243fbf140c8b9",
"title": "Letter to Winston Churchill (1941)", "abstract": "During 1941, codebreaking
at Bletchley Park was hindered by shortages of typists and unskilled staV. These
shortages could have been easily rectiWed, but the codebreakers\u2019 urgent
requests were ignored by oYcials in Whitehall. Going over the heads of those
in command at GC & CS, Turing and his co-signatories wrote directly to the Prime
Minister, Winston Churchill. On receiving the letter Churchill minuted his Chief
of StaV, General Ismay: \u2018action this day Make sure they have all they want
on extreme priority and report to me that this had been done.\u20191 It fell
to Stuart Milner-Barry of Hut 6 to deliver the letter by hand to 10 Downing
Street. In 1986, Milner-Barry recalled his trip to Whitehall:", "venue": "",
"year": 2004, "referenceCount": 0, "citationCount": 0, "influentialCitationCount":
0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Art"], "s2FieldsOfStudy":
[{"category": "Art", "source": "external"}, {"category": "History", "source":
"s2-fos-model"}], "publicationTypes": null, "publicationDate": "2004-09-09",
"journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name":
"A. Turing"}, {"authorId": "73506204", "name": "Gordon Welchman"}]}, {"paperId":
"48ce988e6f5c63cda3d06e3a40bf06dbaf922bb8", "externalIds": {"MAG": "2030737075",
"DBLP": "journals/cryptologia/Turing03", "DOI": "10.1080/0161-110391891748",
"CorpusId": 12703115}, "corpusId": 12703115, "publicationVenue": {"id": "ec317d71-24e9-4750-b911-76378b2fa378",
"name": "Cryptologia", "type": "journal", "issn": "0161-1194", "url": "http://www.informaworld.com/1558-1586",
"alternate_urls": ["http://www.tandfonline.com/loi/ucry20", "http://www.tandfonline.com/toc/ucry20/current#.UkSZ03nD_Qw"]},
"url": "https://www.semanticscholar.org/paper/48ce988e6f5c63cda3d06e3a40bf06dbaf922bb8",
"title": "ALAN M. TURING''S CRITIQUE OF RUNNING SHORT CRIBS ON THE U. S. NAVY
BOMBE", "abstract": "Unified lossless information have led to many natural advances,
including the partition table and massive multiplayer online roleplaying games.
In this work, we disprove the analysis of B-trees that would make synthesizing
Lamport clocks a real possibility. In this position paper, we argue that Boolean
logic and Markov models can agree to accomplish this purpose.", "venue": "Cryptologia",
"year": 2003, "referenceCount": 107, "citationCount": 1, "influentialCitationCount":
0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer
Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"},
{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Mathematics",
"source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate":
"2003-01-01", "journal": {"volume": "27", "pages": "44 - 49", "name": "Cryptologia"},
"authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "26c97e0bccfe60aa7c4c1b613bc890c8ed9a32b9",
"externalIds": {"DBLP": "journals/cryptologia/Turing01", "MAG": "1992023589",
"DOI": "10.1080/0161-110191889734", "CorpusId": 14207094}, "corpusId": 14207094,
"publicationVenue": {"id": "ec317d71-24e9-4750-b911-76378b2fa378", "name": "Cryptologia",
"type": "journal", "issn": "0161-1194", "url": "http://www.informaworld.com/1558-1586",
"alternate_urls": ["http://www.tandfonline.com/loi/ucry20", "http://www.tandfonline.com/toc/ucry20/current#.UkSZ03nD_Qw"]},
"url": "https://www.semanticscholar.org/paper/26c97e0bccfe60aa7c4c1b613bc890c8ed9a32b9",
"title": "VISIT TO NATIONAL CASH REGISTER CORPORATION OF DAYTON, OHIO", "abstract":
"In recent years, much research has been devoted to the study of Boolean logic;
however, few have developed the extensive unification of the location-identity
split and co ntextfree grammar. After years of appropriate research into mode
l checking, we verify the visualization of systems. In our research, we validate
that the lookaside buffer and red-bla ck trees are never incompatible [54],
[58], [59], [62], [68], [ 68], [68], [70], [95], [99], [114], [128], [129],
[148], [152], [ 168], [168], [179], [188], [191].", "venue": "Cryptologia",
"year": 2001, "referenceCount": 103, "citationCount": 190, "influentialCitationCount":
1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer
Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"},
{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes":
["JournalArticle"], "publicationDate": "2001-01-01", "journal": {"volume": "25",
"pages": "1 - 10", "name": "Cryptologia"}, "authors": [{"authorId": "2262347",
"name": "A. Turing"}]}, {"paperId": "b52adf784f9a0ca3b936f39a90cf3445b48dc408",
"externalIds": {"MAG": "2798463542", "DOI": "10.1007/3-540-31288-9_9", "CorpusId":
125729536}, "corpusId": 125729536, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b52adf784f9a0ca3b936f39a90cf3445b48dc408",
"title": "Mathematical logic", "abstract": null, "venue": "", "year": 2001,
"referenceCount": 0, "citationCount": 2, "influentialCitationCount": 1, "isOpenAccess":
false, "openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy":
[{"category": "Computer Science", "source": "external"}, {"category": "Mathematics",
"source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": null,
"journal": {"volume": "", "name": ""}, "authors": [{"authorId": "2262347", "name":
"A. Turing"}]}, {"paperId": "ff86cd6a800d402b7e64ca0ea913fed5351dc2b5", "externalIds":
{"CorpusId": 36555737}, "corpusId": 36555737, "publicationVenue": null, "url":
"https://www.semanticscholar.org/paper/ff86cd6a800d402b7e64ca0ea913fed5351dc2b5",
"title": "Five 1951 BBC Broadcasts on Automatic Calculating Machines", "abstract":
"Researchers of Britain\u2019s early postwar history of computing have known
for some time that a series of five British Broadcasting Corporation (BBC) radio
broadcasts under the general title of \u201cAutomatic Calculating Machines\u201d
was broadcast on the BBC\u2019s Third Programme radio service in May\u2013June
1951. In these broadcasts, five British pioneers of computing spoke about their
work. In the order of their broadcasts, they were Douglas Hartree, Max Newman,
Alan Turing, Frederic (\u201cFreddie\u201d) Williams, and Maurice Wilkes. Apart
from Turing\u2019s broadcast, which has been discussed by B. Jack Copeland1
and Andrew Hodges,2 these broadcasts have received little attention from historians
of computing. No sound recordings of the broadcasts survive, although they all
were recorded on acetate phonograph discs prior to transmission. However, texts
of all five broadcasts survive as BBC transcripts, which were taken from the
recordings shortly after they were made. These transcripts are held at the BBC\u2019s
Written Archives Centre in Caversham, near Reading, and are the basis for this
article. In addition to the existence of the five BBC transcripts, three of
the speakers\u2019 scripts are known to have survived. These are Turing\u2019s,
held at the Alan Turing archive at King\u2019s College, Cambridge, and those
of Wilkes and Newman, copies of which are held by Wilkes. Turing\u2019s script
has been published,3 although curiously not in the Collected Works of A.M. Turing,4
and is also available on the Word Wide Web.5 None of the other scripts has been
published. All five of the speakers in this series were, or had been, involved
with one or more of the three major computing projects in the UK in the immediate
postwar period: \u2022 ACE (Automatic Computing Engine), at the National Physical
Laboratory, designed by Turing, launched in 1946 and experimentally operational
in a pilot version in 1950, although not completed until late 1951.6 \u2022
EDSAC (Electronic Delay Storage Automatic Computer), at Cambridge University,
designed by Wilkes, begun in 1947 and operational in May 1949.7 \u2022 Mark
1 Prototype at Manchester University, associated with Newman, Williams, and
(from 1948) Turing. Operational from April 1949 to August 1950, having evolved
from an earlier \u201cBaby\u201d test machine (operational June 1948) and replaced
in February 1951 by the Ferranti Mark 1.8", "venue": "", "year": 2001, "referenceCount":
25, "citationCount": 1, "influentialCitationCount": 0, "isOpenAccess": false,
"openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category":
"Computer Science", "source": "s2-fos-model"}, {"category": "History", "source":
"s2-fos-model"}], "publicationTypes": null, "publicationDate": null, "journal":
null, "authors": [{"authorId": "16620717", "name": "D. Hartree"}, {"authorId":
"2233530095", "name": "Max Newman"}, {"authorId": "2262347", "name": "A. Turing"}]},
{"paperId": "650d4e7c4fbd68b05f87a46985f1da6f2f4f0ed8", "externalIds": {"MAG":
"2316135739", "DOI": "10.1093/PHILMAT/4.3.256", "CorpusId": 5213112}, "corpusId":
5213112, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/650d4e7c4fbd68b05f87a46985f1da6f2f4f0ed8",
"title": "Intelligent Machinery, A Heretical Theory*", "abstract": "The analysis
of interrupts is a structured quagmire. In this position paper, we demonstrate
the investigation of simulated annealing. KaliNil, our new methodology for DNS,
is the solution to all of these problems.", "venue": "", "year": 1996, "referenceCount":
101, "citationCount": 214, "influentialCitationCount": 8, "isOpenAccess": true,
"openAccessPdf": {"url": "https://academic.oup.com/philmat/article-pdf/4/3/256/21430726/4-3-256.pdf",
"status": null}, "fieldsOfStudy": ["Mathematics"], "s2FieldsOfStudy": [{"category":
"Mathematics", "source": "external"}, {"category": "Computer Science", "source":
"s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}], "publicationTypes":
null, "publicationDate": "1996-09-01", "journal": {"volume": "4", "pages": "256-260",
"name": "Philosophia Mathematica"}, "authors": [{"authorId": "2262347", "name":
"A. Turing"}]}, {"paperId": "509a622da7869a8eb345eea921ed30924a73e6fa", "externalIds":
{"CorpusId": 18573444}, "corpusId": 18573444, "publicationVenue": null, "url":
"https://www.semanticscholar.org/paper/509a622da7869a8eb345eea921ed30924a73e6fa",
"title": "Computer poker", "abstract": "Games are an interesting and challenging
domain for computer science research, having the nice characteristics of a clearly
deened set of rules and a speciic goal. Developing a program to play a strategic
game well often involves the application of theoretical concepts to practical
situations, and the relative success of that endeavour can be measured with
quantiiable results. The game of poker is logistically simple yet strategically
complex, and ooers many properties not exhibited by chess, checkers, and most
other well-studied games. Most importantly, poker is a non-deterministic game
with imperfect (hidden) information. Handling unreliable or incomplete information
is a fundamental problem in computer science, and poker provides an excellent
domain for investigating problems of decision making under conditions of uncertainty.
Somewhat surprisingly, the potential beneets of studying poker have been largely
overlooked by computer scientists and game researchers. In this essay we survey
what resources are available for academic researchers, and lay some foundations
for the sci-entiic exploration of this fascinating game.", "venue": "", "year":
1995, "referenceCount": 129, "citationCount": 12, "influentialCitationCount":
1, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": null, "s2FieldsOfStudy":
[{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes":
["Review"], "publicationDate": null, "journal": null, "authors": [{"authorId":
"39261667", "name": "Darse Billings"}, {"authorId": "41224665", "name": "J.
Neumann"}, {"authorId": "2262347", "name": "A. Turing"}, {"authorId": "144461837",
"name": "C. Shannon"}, {"authorId": "143805236", "name": "J. McCarthy"}, {"authorId":
"1717349", "name": "D. Knuth"}, {"authorId": "48603437", "name": "A. Newell"},
{"authorId": "2055346931", "name": "Herbert A. Simon"}, {"authorId": "7991309",
"name": "A. Samuel"}, {"authorId": "145878706", "name": "D. Michie"}, {"authorId":
"102213388", "name": "K. Thompson"}]}, {"paperId": "e972b5110d036991078e55bede6608a7cdaf48b1",
"externalIds": {"CorpusId": 8597454, "PubMed": "7564963"}, "corpusId": 8597454,
"publicationVenue": {"id": "2060f67b-894f-4036-95ff-a11601fc257a", "name": "M.D.Computing",
"type": "journal", "alternate_names": ["M.D comput comput med pract", "M.D.
computing : computers in medical practice", "M D Comput", "M D Computing"],
"issn": "0724-6811"}, "url": "https://www.semanticscholar.org/paper/e972b5110d036991078e55bede6608a7cdaf48b1",
"title": "Lecture to the London Mathematical Society on 20 February 1947. 1986.",
"abstract": null, "venue": "M.D.Computing", "year": 1995, "referenceCount":
0, "citationCount": 147, "influentialCitationCount": 15, "isOpenAccess": false,
"openAccessPdf": null, "fieldsOfStudy": ["Medicine"], "s2FieldsOfStudy": [{"category":
"Medicine", "source": "external"}, {"category": "Computer Science", "source":
"s2-fos-model"}, {"category": "Mathematics", "source": "s2-fos-model"}, {"category":
"Medicine", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"],
"publicationDate": null, "journal": {"volume": "12 5", "pages": "\n 390-7\n ",
"name": "M.D. computing : computers in medical practice"}, "authors": [{"authorId":
"2262347", "name": "A. Turing"}]}, {"paperId": "33adb5256f85d7835696611b2517797dcb260ddb",
"externalIds": {"MAG": "1577952063", "CorpusId": 60626324}, "corpusId": 60626324,
"publicationVenue": null, "url": "https://www.semanticscholar.org/paper/33adb5256f85d7835696611b2517797dcb260ddb",
"title": "Manchester computing machine: general topics", "abstract": null, "venue":
"", "year": 1989, "referenceCount": 0, "citationCount": 1, "influentialCitationCount":
0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer
Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"},
{"category": "Computer Science", "source": "s2-fos-model"}, {"category": "Engineering",
"source": "s2-fos-model"}], "publicationTypes": null, "publicationDate": "1989-05-01",
"journal": {"volume": "", "pages": "194-196", "name": ""}, "authors": [{"authorId":
"90657571", "name": "M. J. Lighthill"}, {"authorId": "16909947", "name": "G.
C. Tootill"}, {"authorId": "143726570", "name": "J. Miller"}, {"authorId": "2262347",
"name": "A. Turing"}, {"authorId": "143809548", "name": "E. A. Newman"}]}, {"paperId":
"a28fe905a92c75ae2098acacad53c992e4bce52d", "externalIds": {"MAG": "1506559289",
"CorpusId": 60659734}, "corpusId": 60659734, "publicationVenue": null, "url":
"https://www.semanticscholar.org/paper/a28fe905a92c75ae2098acacad53c992e4bce52d",
"title": "Local programming methods and conventions", "abstract": null, "venue":
"", "year": 1989, "referenceCount": 0, "citationCount": 138, "influentialCitationCount":
3, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer
Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"},
{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes":
null, "publicationDate": "1989-05-01", "journal": {"volume": "", "pages": "178",
"name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId":
"b7682dfbd4c03e287265d64e46388d21eedf3394", "externalIds": {"MAG": "46849891",
"DOI": "10.1093/oso/9780198250791.003.0017", "CorpusId": 172414532}, "corpusId":
172414532, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/b7682dfbd4c03e287265d64e46388d21eedf3394",
"title": "Computing Machinery and Intelligence (1950)", "abstract": null, "venue":
"Ideas That Created the Future", "year": 1989, "referenceCount": 0, "citationCount":
51, "influentialCitationCount": 1, "isOpenAccess": false, "openAccessPdf": null,
"fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer
Science", "source": "external"}, {"category": "Computer Science", "source":
"s2-fos-model"}], "publicationTypes": null, "publicationDate": "1989-06-01",
"journal": {"name": "Ideas That Created the Future"}, "authors": [{"authorId":
"2262347", "name": "A. Turing"}]}, {"paperId": "f50fef843592d31124e629420a5d7df39a51fcd7",
"externalIds": {"MAG": "1723067587", "CorpusId": 56518797}, "corpusId": 56518797,
"publicationVenue": null, "url": "https://www.semanticscholar.org/paper/f50fef843592d31124e629420a5d7df39a51fcd7",
"title": "Checking a large routine", "abstract": null, "venue": "", "year":
1989, "referenceCount": 0, "citationCount": 402, "influentialCitationCount":
39, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer
Science"], "s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"},
{"category": "Computer Science", "source": "s2-fos-model"}], "publicationTypes":
null, "publicationDate": "1989-05-01", "journal": {"volume": "", "pages": "70-72",
"name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId":
"fc5ef435b26155d2ea554a8062781739c8ccf296", "externalIds": {"MAG": "627474889",
"CorpusId": 190961434}, "corpusId": 190961434, "publicationVenue": null, "url":
"https://www.semanticscholar.org/paper/fc5ef435b26155d2ea554a8062781739c8ccf296",
"title": "Intelligence service : Schriften", "abstract": null, "venue": "",
"year": 1987, "referenceCount": 0, "citationCount": 43, "influentialCitationCount":
0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Psychology"],
"s2FieldsOfStudy": [{"category": "Psychology", "source": "external"}], "publicationTypes":
null, "publicationDate": null, "journal": {"volume": "", "name": ""}, "authors":
[{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "401226dbe808714439b7f4fe6ce17e3fb5a6e790",
"externalIds": {"CorpusId": 7990676}, "corpusId": 7990676, "publicationVenue":
null, "url": "https://www.semanticscholar.org/paper/401226dbe808714439b7f4fe6ce17e3fb5a6e790",
"title": "Artificial Intelligence : Usfssg Computers to Think about Thinking
. Part 1", "abstract": "In 1950, Alan M. Turing, the late deputy director of
the University of Manchester\u2019s Computing Laboratory in England, proposed
a novel test to determine whether a machine was capable of thinking. In thk
test, an interrogator has a teletype conversation with a man and a woman, both
of whom must try to convince the interrogator that they are the woman. At some
point unknown to the interrogator, the man is replaced by a machine. If the
interrogator is fooled as often by the machine as by the man, that machine can
be said to have displayed intelligent behavior. 1 Some 30 years after Turing
proposed this test, many aspects of human behavior have been simulated by a
computer. Programs have been designed to play checkersz and chess,J prove mathematical
theorems ,4,5 and even mimic the behavior of a paranoid human being.b Despite
the success of these and many other programs, none of the researchers investigating
what\u2019s been variously cafled \u201capplied epistemology\u201d or \u201cartificial
intelligence\u201d (AI) would claim this means the \u201cthinking machine\u201d
has arrived. Instead, they would agree that these programs have contributed
important information about human behavior, and how computers can simulate it.
The first part of this two-part essay will review some of the theones AI researchers
have developed to explain human \u201cinformation processing.\u201d The second
part of the essay will cover some applications of AI research. These include
programs used in robotics, programs that communicate with computer users in
natural languages such as English, and \u201cexpert systems\u201d which help
chemists, physicians, and others perform decision-making tasks. The \u201cpioneer\u201d
expert system, DENDRAL, will be discussed in some detail.T.~ AI grew out of
the convergence of ideas in several different fields, and the availability of
new technologies. According to Avrom Barr and Edward A. Feigenbaum, Stanford
University, California, the single most important factor contributing to the
birth of the field was the invention of the computer.9 They point out that human
beings have always drawn analogies between mechanical devices and their own
behavior. Computers, with their memories and information-processing abilities,
naturafly invited analogies with the human brain. Shortly after digital computers
became available, computer scientists began creating programs that, they hoped,
would perform tasks generally considered to require intelligence. Their earliest
efforts were directed at programming computers to solve puzzles, play games
such as chess, backgammon, and checkers, solve mathematical theorems, and translate
text from one language to another. The early computer programs performed these
tasks, but not very well. For example, chess programs were successful at following
the step-by-step instructions for moving chessmen. But computers couldn\u2019t
independently gen-", "venue": "", "year": 1983, "referenceCount": 96, "citationCount":
194, "influentialCitationCount": 3, "isOpenAccess": false, "openAccessPdf":
null, "fieldsOfStudy": null, "s2FieldsOfStudy": [{"category": "Computer Science",
"source": "s2-fos-model"}, {"category": "Philosophy", "source": "s2-fos-model"}],
"publicationTypes": ["Review"], "publicationDate": null, "journal": null, "authors":
[{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId": "d4debce0b1f19a9840796b75371ba98f8a3645a3",
"externalIds": {"MAG": "2078264095", "DOI": "10.1109/PROC.1983.12736", "CorpusId":
5287495}, "corpusId": 5287495, "publicationVenue": {"id": "6faaccca-1cc4-45a9-aeb6-96a4901d2606",
"name": "Proceedings of the IEEE", "type": "journal", "alternate_names": ["Proc
IEEE"], "issn": "0018-9219", "alternate_issns": ["1558-2256"], "url": "http://www.ieee.org/portal/pages/pubs/proceedings/",
"alternate_urls": ["http://www.ieee.org/products/onlinepubs/pub/about_conference.html",
"https://ieeexplore.ieee.org/servlet/opac?punumber=5", "http://proceedingsoftheieee.ieee.org/"]},
"url": "https://www.semanticscholar.org/paper/d4debce0b1f19a9840796b75371ba98f8a3645a3",
"title": "Introduction to computer organization", "abstract": "That platform
is specific in books sharing across different users and countries, and guide
Introduction To Computer Organization could be also downloaded from here. We
are doing all probable to create our customers the most effective publications
like Introduction To Computer Organization Download PDF for free download. Often
you are looking for the guide in PDF or EPUB our resource may bring Introduction
To Computer Organizationto you in every probable format. The guide you search
in hd can be acquired here Introduction To Computer Organization Download PDF,
just a step to download. If you are looking for Introduction To Computer Organization
or classics, do check this 1 site. At this moment I''d recommend using the Amazon
plans to obtain Introduction To Computer Organization Download PDF. Get Introduction
To Computer Organization Download PDF e-books you may think of and read to see
internet sites offering e-books downloads. This is one of the finest sites to
download free ebooks and claim to provide a lot more than 37,000 under different
classes Introduction To Computer Organization. You are able to study Introduction
To Computer Organization Download PDF on line, or get a PDF or ePUB format of
the book. Do visit this site for Introduction To Computer Organization Download
PDF! Wish I really could be of help for you! Great fiction ought to be shared
with friends, so if you enjoy anything you are studying, allow them know if
you prefer Introduction To Computer Organization Download PDF. The internet
sites can be an open, editable selection catalog to read free Introduction To
Computer Organization online. Our digital selection preserves in element countries,
enabling you to get the absolute most less latency time to download any of our
publications following this one. Only said, the Introduction To Computer Organization
is universally compatible afterward any units to read. It''s your decided possess
develop old to artificial researching habit. in the middle of books, you can
appreciate now''s Introduction To Computer Organization Download PDF below.
Getting the publications Introduction To Computer Organization Download PDF
now could be perhaps not the kind of demanding means. You can not single-handedly
planning consequently book inventory or library or borrowing from your friends
to revise them. This is an incredibly easy way to especially obtain the guide
on-line. This online report Introduction To Computer Organization Download PDF
can be one of the choices to accompany you later having further time. It won''t
consent many grow older once we accustom before. You are able to total it although
appear in another thing at the house and even in your workplace. well easy!
Therefore, have you been question? Just exercise exactly what we pay for under
as well as evaluation Introduction To Computer Organization everything you next
to read!", "venue": "Proceedings of the IEEE", "year": 1983, "referenceCount":
0, "citationCount": 6, "influentialCitationCount": 0, "isOpenAccess": false,
"openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy":
[{"category": "Computer Science", "source": "external"}, {"category": "Computer
Science", "source": "s2-fos-model"}], "publicationTypes": null, "publicationDate":
"1983-09-01", "journal": {"volume": "71", "pages": "1117-1117", "name": "Proceedings
of the IEEE"}, "authors": [{"authorId": "1754655", "name": "G. Sohi"}, {"authorId":
"2070119934", "name": "Greg Byrd"}, {"authorId": "2262347", "name": "A. Turing"}]},
{"paperId": "a21e47f764df82cd14313faa41e33bda8c232fe7", "externalIds": {"MAG":
"2171014865", "DOI": "10.1093/BIOMET/66.2.393", "CorpusId": 64330274}, "corpusId":
64330274, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/a21e47f764df82cd14313faa41e33bda8c232fe7",
"title": "Studies in the History of Probability and Statistics. XXXVII", "abstract":
"SUMMARY An account is given of A. M. Turing''s unpublished contributions to
statistics during 1941 or 1940.", "venue": "", "year": 1979, "referenceCount":
15, "citationCount": 168, "influentialCitationCount": 2, "isOpenAccess": false,
"openAccessPdf": null, "fieldsOfStudy": ["Computer Science", "Mathematics"],
"s2FieldsOfStudy": [{"category": "Computer Science", "source": "external"},
{"category": "Mathematics", "source": "external"}, {"category": "Mathematics",
"source": "s2-fos-model"}, {"category": "History", "source": "s2-fos-model"}],
"publicationTypes": null, "publicationDate": "1979-08-01", "journal": {"volume":
"", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}, {"authorId":
"145179124", "name": "I. Good"}]}, {"paperId": "24fade315dc6a15961184a3c6dfec064591edcd5",
"externalIds": {"MAG": "1553055254", "CorpusId": 60504948}, "corpusId": 60504948,
"publicationVenue": null, "url": "https://www.semanticscholar.org/paper/24fade315dc6a15961184a3c6dfec064591edcd5",
"title": "Review: Arthur W. Burks, The Logic of Programming Electronic Digital
Computers", "abstract": null, "venue": "", "year": 1953, "referenceCount": 0,
"citationCount": 196, "influentialCitationCount": 2, "isOpenAccess": false,
"openAccessPdf": null, "fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy":
[{"category": "Computer Science", "source": "external"}, {"category": "Computer
Science", "source": "s2-fos-model"}], "publicationTypes": ["Review"], "publicationDate":
"1953-06-01", "journal": {"volume": "18", "pages": "179-179", "name": "Journal
of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]},
{"paperId": "62660c27d93c50f69b1ed614ad9499f4d849aeec", "externalIds": {"MAG":
"2317224626", "DOI": "10.2307/2268956", "CorpusId": 61881712}, "corpusId": 61881712,
"publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6", "name": "Journal
of Symbolic Logic (JSL)", "type": "journal", "alternate_names": ["J Symb Log",
"Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812", "url":
"https://www.cambridge.org/core/journals/journal-of-symbolic-logic", "alternate_urls":
["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL",
"https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/62660c27d93c50f69b1ed614ad9499f4d849aeec",
"title": "Arthur W. Burks. The logic of programming electronic digital computers.
Industrial mathematics (Detroit), vol. 1 (1950), pp. 36\u201352.", "abstract":
"ARTHUR W. BURKS. The logic of programming electronic digital computers. Industrial
mathematics (Detroit), vol. 1 (1950), pp. 36-52. This article does not deal
primarily with \"logic\" in the technical sense. I t is an account of the general
principles of programming, written for the benefit of the technically well informed
reader who wishes to know what sort of an activity programming is. Comparisons
with logic are however introduced, in connection with \"conditional control
transfers\" and the free and bound variables of a programme as defined by Goldstine
and von Neumann. Planning and coding of problems for an electronic computing
instrument, vol. 1, Institute for Advanced Study, 1947.", "venue": "Journal
of Symbolic Logic (JSL)", "year": 1953, "referenceCount": 0, "citationCount":
0, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null,
"fieldsOfStudy": ["Computer Science"], "s2FieldsOfStudy": [{"category": "Computer
Science", "source": "external"}, {"category": "Computer Science", "source":
"s2-fos-model"}], "publicationTypes": null, "publicationDate": "1953-06-01",
"journal": {"volume": "18", "pages": "179 - 179", "name": "Journal of Symbolic
Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]}, {"paperId":
"2d5673caa9e6af3a7b82a43f19ee920992db07ad", "externalIds": {"DBLP": "journals/x/Turing50",
"MAG": "2145482038", "DOI": "10.1093/MIND/LIX.236.433", "CorpusId": 14636783},
"corpusId": 14636783, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/2d5673caa9e6af3a7b82a43f19ee920992db07ad",
"title": "Computing Machinery and Intelligence", "abstract": "I propose to consider
the question, \u201cCan machines think?\u201d\u2663 This should begin with definitions
of the meaning of the terms \u201cmachine\u201d and \u201cthink\u201d. The definitions
might be framed so as to reflect so far as possible the normal use of the words,
but this attitude is dangerous. If the meaning of the words \u201cmachine\u201d
and \u201cthink\u201d are to be found by examining how they are commonly used
it is difficult to escape the conclusion that the meaning and the answer to
the question, \u201cCan machines think?\u201d is to be sought in a statistical
survey such as a Gallup poll.", "venue": "The Philosophy of Artificial Intelligence",
"year": 1950, "referenceCount": 14, "citationCount": 9664, "influentialCitationCount":
525, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer
Science", "Sociology"], "s2FieldsOfStudy": [{"category": "Computer Science",
"source": "external"}, {"category": "Sociology", "source": "external"}, {"category":
"Computer Science", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle",
"Review"], "publicationDate": "1950-10-01", "journal": {"volume": "LIX", "pages":
"433-460", "name": "Mind"}, "authors": [{"authorId": "2262347", "name": "A.
Turing"}]}, {"paperId": "c35cf8a54e655e91f8657cf8403d578994fb27c5", "externalIds":
{"MAG": "2419349071", "DOI": "10.2307/j.ctv8d5sh5.6", "CorpusId": 148545092},
"corpusId": 148545092, "publicationVenue": null, "url": "https://www.semanticscholar.org/paper/c35cf8a54e655e91f8657cf8403d578994fb27c5",
"title": "PSYCHOLOGY AND PHILOSOPHY", "abstract": "1. The Imitation Game. I
PROPOSE tO consider the question, ''Can machines think ? This should begin with
definitions of the meaning of the terms ''machine'' and ''think''. The definitions
might be framed so as to reflect so far as possible the normal use of the words,
but this attitude is dangerous. If the meaning of the words ''machine'' and
''think ''are to be found by examining how they are commonly used it is difficult
to escape the conclusion that the meaning and the answer to tlie question, ''
Can machines think ? '' is to be sought in a statistical survey such as a Gallup
poll. But this is absurd. Instead of attempting such a definition I shall replace
the question by another, which is closely related to it and is expressed in
relatively unambiguous words. The new form of the problem can be described in
terms of a game which we call the ''imitation game''. It is played with three
people, a man (A), a woman (B), and an interrogator (C) who may be of either
sex. The interrogator stays in a room apart from the other two. The object of
the game for the interrogator is to determine which of the other two is the
man and which is the woman. He knows them by labels X and Y, and at the end
of the game he says either '' X is A and Y is B '' or '' X is B and Y is A''.
The interrogator is allowed to put questions to A and B thus: C: Will X please
tell me the length of his or her hair 2 Now suppose X is aetually A, then A
must answer. It is A''s", "venue": "", "year": 1950, "referenceCount": 6, "citationCount":
27, "influentialCitationCount": 0, "isOpenAccess": false, "openAccessPdf": null,
"fieldsOfStudy": ["Psychology"], "s2FieldsOfStudy": [{"category": "Psychology",
"source": "external"}, {"category": "Philosophy", "source": "s2-fos-model"}],
"publicationTypes": ["Review"], "publicationDate": null, "journal": {"volume":
"", "name": ""}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]},
{"paperId": "092da8384571c8261858e91e3278e765eedde1d5", "externalIds": {"DBLP":
"journals/jsyml/Turing48", "MAG": "2092575189", "DOI": "10.2307/2267329", "CorpusId":
5770563}, "corpusId": 5770563, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6",
"name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names":
["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812",
"url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic",
"alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL",
"https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/092da8384571c8261858e91e3278e765eedde1d5",
"title": "Practical forms of type theory", "abstract": "Russell''s theory of
types, though probably not providing the soundest possible foundation for mathematics,
follows closely the outlook of most mathematicians. The present paper is an
attempt to present the theory of types in forms in which the types themselves
only play a rather small part, as they do in ordinary mathematical argument.
Two logical systems are described (called the \u201cnested-type\u201d and \u201cconcealed-type\u201d
systems). It is hoped that the ideas involved in these systems may help mathematicians
to observe type theory in proofs as well as in doctrine. It will not be necessary
to adopt a formal logical notation to do so.", "venue": "Journal of Symbolic
Logic (JSL)", "year": 1948, "referenceCount": 73, "citationCount": 211, "influentialCitationCount":
20, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Philosophy",
"Computer Science"], "s2FieldsOfStudy": [{"category": "Philosophy", "source":
"external"}, {"category": "Computer Science", "source": "external"}, {"category":
"Mathematics", "source": "s2-fos-model"}, {"category": "Philosophy", "source":
"s2-fos-model"}], "publicationTypes": ["JournalArticle"], "publicationDate":
"1948-06-01", "journal": {"volume": "13", "pages": "80 - 94", "name": "Journal
of Symbolic Logic"}, "authors": [{"authorId": "2262347", "name": "A. Turing"}]},
{"paperId": "65069064b19ec8244044311a2a90fbf2c9161675", "externalIds": {"DBLP":
"journals/jsyml/NewmanT42", "MAG": "1988522427", "DOI": "10.2307/2267552", "CorpusId":
17917182}, "corpusId": 17917182, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6",
"name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names":
["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812",
"url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic",
"alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL",
"https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/65069064b19ec8244044311a2a90fbf2c9161675",
"title": "A formal theorem in Church''s theory of types", "abstract": "This
note is concerned with the logical formalism with types recently introduced
by Church [1] (and called (C) in this note) It was shewn in his paper (Theorem
26\u03b1) that if Y\u03b1 stands for (a form of the \u201caxiom of infinity\u201d
for the type \u03b1), Y\u03b1 can be proved formally, from Y\u03b9 and the axioms
1 to 7, for all types \u03b1 of the forms \u03b9\u2032, \u03b9\u2033, \u2026.
For other types the question was left open, but for the purposes of an intrinsic
characterisation of the Church type-stratification given by one of us, it is
desirable to have the remaining cases cleared up. A formal proof of Y\u03b1
is now given for all types \u03b1 containing \u03b9, but the proof uses, in
addition to Axioms 1 to 7 and Y\u03b9, also Axiom 9 (in connection with Def.
4), and Axiom 10 (in Theorem 9).", "venue": "Journal of Symbolic Logic (JSL)",
"year": 1942, "referenceCount": 64, "citationCount": 14, "influentialCitationCount":
0, "isOpenAccess": false, "openAccessPdf": null, "fieldsOfStudy": ["Computer
Science", "Mathematics"], "s2FieldsOfStudy": [{"category": "Computer Science",
"source": "external"}, {"category": "Mathematics", "source": "external"}, {"category":
"Mathematics", "source": "s2-fos-model"}], "publicationTypes": ["JournalArticle"],
"publicationDate": "1942-03-01", "journal": {"volume": "7", "pages": "28 - 33",
"name": "Journal of Symbolic Logic"}, "authors": [{"authorId": "143697232",
"name": "M. Newman"}, {"authorId": "2262347", "name": "A. Turing"}]}, {"paperId":
"7aa8e40e1b94b5e9fe2e1703ffa7433378b484fe", "externalIds": {"DBLP": "journals/jsyml/Turing42",
"MAG": "2065302580", "DOI": "10.2307/2268111", "CorpusId": 17112802}, "corpusId":
17112802, "publicationVenue": {"id": "63b08ff1-8bea-4d94-af61-35bf9dbaeef6",
"name": "Journal of Symbolic Logic (JSL)", "type": "journal", "alternate_names":
["J Symb Log", "Journal of Symbolic Logic", "J Symb Log (JSL"], "issn": "0022-4812",
"url": "https://www.cambridge.org/core/journals/journal-of-symbolic-logic",
"alternate_urls": ["http://www.aslonline.org/journals-journal.html", "http://journals.cambridge.org/action/displayJournal?jid=JSL",
"https://www.jstor.org/journal/jsymboliclogic"]}, "url": "https://www.semanticscholar.org/paper/7aa8e40e1b94b5e9fe2e1703ffa7433378b484fe",
"title": "The use of dots as brackets in Church''s system", "abstract": "Any
logical system, if its use is to be carried beyond a rather elementary stage,
needs powerful conventions about abbreviations: in particular one usually wants